Analysis
-
max time kernel
154s -
max time network
124s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
18-11-2021 09:38
Static task
static1
Behavioral task
behavioral1
Sample
8696a4269e30ddb34a7e0e84629ede03.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
8696a4269e30ddb34a7e0e84629ede03.exe
Resource
win10-en-20211104
General
-
Target
8696a4269e30ddb34a7e0e84629ede03.exe
-
Size
278KB
-
MD5
8696a4269e30ddb34a7e0e84629ede03
-
SHA1
125198e1f636ef118e468145d02e801a3ffe2a97
-
SHA256
47ec411eab0aa15619f24caa6256ed4ca5cfc695a26f5b71830b53b07c22b05b
-
SHA512
481ae35ec056de3c08ae167e7b2fea9352c82a7cd47ebbc46047270e1a0f518b3feece8ad6900d0a5ac5ca1b44c80da0e916504809e93e176933931d940cad96
Malware Config
Extracted
smokeloader
2020
http://rsuehfidvdkfvk.top/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 3044 -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
8696a4269e30ddb34a7e0e84629ede03.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8696a4269e30ddb34a7e0e84629ede03.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8696a4269e30ddb34a7e0e84629ede03.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8696a4269e30ddb34a7e0e84629ede03.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
8696a4269e30ddb34a7e0e84629ede03.exepid process 2904 8696a4269e30ddb34a7e0e84629ede03.exe 2904 8696a4269e30ddb34a7e0e84629ede03.exe 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3044 -
Suspicious behavior: MapViewOfSection 27 IoCs
Processes:
8696a4269e30ddb34a7e0e84629ede03.exepid process 2904 8696a4269e30ddb34a7e0e84629ede03.exe 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
description pid process target process PID 3044 wrote to memory of 3968 3044 explorer.exe PID 3044 wrote to memory of 3968 3044 explorer.exe PID 3044 wrote to memory of 3968 3044 explorer.exe PID 3044 wrote to memory of 3968 3044 explorer.exe PID 3044 wrote to memory of 1216 3044 explorer.exe PID 3044 wrote to memory of 1216 3044 explorer.exe PID 3044 wrote to memory of 1216 3044 explorer.exe PID 3044 wrote to memory of 1480 3044 explorer.exe PID 3044 wrote to memory of 1480 3044 explorer.exe PID 3044 wrote to memory of 1480 3044 explorer.exe PID 3044 wrote to memory of 1480 3044 explorer.exe PID 3044 wrote to memory of 1484 3044 explorer.exe PID 3044 wrote to memory of 1484 3044 explorer.exe PID 3044 wrote to memory of 1484 3044 explorer.exe PID 3044 wrote to memory of 1484 3044 explorer.exe PID 3044 wrote to memory of 4004 3044 explorer.exe PID 3044 wrote to memory of 4004 3044 explorer.exe PID 3044 wrote to memory of 4004 3044 explorer.exe PID 3044 wrote to memory of 1000 3044 explorer.exe PID 3044 wrote to memory of 1000 3044 explorer.exe PID 3044 wrote to memory of 1000 3044 explorer.exe PID 3044 wrote to memory of 1000 3044 explorer.exe PID 3044 wrote to memory of 888 3044 explorer.exe PID 3044 wrote to memory of 888 3044 explorer.exe PID 3044 wrote to memory of 888 3044 explorer.exe PID 3044 wrote to memory of 1284 3044 explorer.exe PID 3044 wrote to memory of 1284 3044 explorer.exe PID 3044 wrote to memory of 1284 3044 explorer.exe PID 3044 wrote to memory of 1284 3044 explorer.exe PID 3044 wrote to memory of 2300 3044 explorer.exe PID 3044 wrote to memory of 2300 3044 explorer.exe PID 3044 wrote to memory of 2300 3044 explorer.exe PID 3044 wrote to memory of 2324 3044 explorer.exe PID 3044 wrote to memory of 2324 3044 explorer.exe PID 3044 wrote to memory of 2324 3044 explorer.exe PID 3044 wrote to memory of 2324 3044 explorer.exe PID 3044 wrote to memory of 1364 3044 explorer.exe PID 3044 wrote to memory of 1364 3044 explorer.exe PID 3044 wrote to memory of 1364 3044 explorer.exe PID 3044 wrote to memory of 1364 3044 explorer.exe PID 3044 wrote to memory of 2856 3044 explorer.exe PID 3044 wrote to memory of 2856 3044 explorer.exe PID 3044 wrote to memory of 2856 3044 explorer.exe PID 3044 wrote to memory of 2108 3044 explorer.exe PID 3044 wrote to memory of 2108 3044 explorer.exe PID 3044 wrote to memory of 2108 3044 explorer.exe PID 3044 wrote to memory of 2108 3044 explorer.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8696a4269e30ddb34a7e0e84629ede03.exe"C:\Users\Admin\AppData\Local\Temp\8696a4269e30ddb34a7e0e84629ede03.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/888-140-0x0000000000000000-mapping.dmp
-
memory/888-142-0x0000000000BB0000-0x0000000000BBC000-memory.dmpFilesize
48KB
-
memory/888-141-0x0000000000BC0000-0x0000000000BC6000-memory.dmpFilesize
24KB
-
memory/1000-137-0x0000000000000000-mapping.dmp
-
memory/1000-139-0x0000000002E30000-0x0000000002E39000-memory.dmpFilesize
36KB
-
memory/1000-138-0x0000000002E40000-0x0000000002E45000-memory.dmpFilesize
20KB
-
memory/1216-123-0x0000000000000000-mapping.dmp
-
memory/1216-126-0x0000000000110000-0x0000000000117000-memory.dmpFilesize
28KB
-
memory/1216-127-0x0000000000100000-0x000000000010C000-memory.dmpFilesize
48KB
-
memory/1284-143-0x0000000000000000-mapping.dmp
-
memory/1284-145-0x0000000002DA0000-0x0000000002DA9000-memory.dmpFilesize
36KB
-
memory/1284-144-0x0000000002DB0000-0x0000000002DB4000-memory.dmpFilesize
16KB
-
memory/1364-152-0x0000000000000000-mapping.dmp
-
memory/1364-153-0x00000000001C0000-0x00000000001C6000-memory.dmpFilesize
24KB
-
memory/1364-154-0x00000000001B0000-0x00000000001BB000-memory.dmpFilesize
44KB
-
memory/1480-130-0x0000000002A00000-0x0000000002A09000-memory.dmpFilesize
36KB
-
memory/1480-128-0x0000000000000000-mapping.dmp
-
memory/1480-129-0x0000000002A10000-0x0000000002A14000-memory.dmpFilesize
16KB
-
memory/1484-132-0x0000000002A10000-0x0000000002A17000-memory.dmpFilesize
28KB
-
memory/1484-133-0x0000000002A00000-0x0000000002A0B000-memory.dmpFilesize
44KB
-
memory/1484-131-0x0000000000000000-mapping.dmp
-
memory/2108-160-0x00000000027B0000-0x00000000027BB000-memory.dmpFilesize
44KB
-
memory/2108-159-0x00000000027C0000-0x00000000027C8000-memory.dmpFilesize
32KB
-
memory/2108-158-0x0000000000000000-mapping.dmp
-
memory/2300-147-0x00000000004B0000-0x00000000004B5000-memory.dmpFilesize
20KB
-
memory/2300-146-0x0000000000000000-mapping.dmp
-
memory/2300-148-0x00000000004A0000-0x00000000004A9000-memory.dmpFilesize
36KB
-
memory/2324-149-0x0000000000000000-mapping.dmp
-
memory/2324-150-0x0000000000230000-0x0000000000252000-memory.dmpFilesize
136KB
-
memory/2324-151-0x0000000000200000-0x0000000000227000-memory.dmpFilesize
156KB
-
memory/2856-156-0x0000000000390000-0x0000000000397000-memory.dmpFilesize
28KB
-
memory/2856-155-0x0000000000000000-mapping.dmp
-
memory/2856-157-0x0000000000380000-0x000000000038D000-memory.dmpFilesize
52KB
-
memory/2904-120-0x0000000000400000-0x0000000001FCC000-memory.dmpFilesize
27.8MB
-
memory/2904-119-0x0000000001FD0000-0x000000000207E000-memory.dmpFilesize
696KB
-
memory/3044-121-0x0000000000910000-0x0000000000926000-memory.dmpFilesize
88KB
-
memory/3968-124-0x0000000003340000-0x00000000033B4000-memory.dmpFilesize
464KB
-
memory/3968-122-0x0000000000000000-mapping.dmp
-
memory/3968-125-0x00000000032D0000-0x000000000333B000-memory.dmpFilesize
428KB
-
memory/4004-136-0x0000000000540000-0x000000000054F000-memory.dmpFilesize
60KB
-
memory/4004-134-0x0000000000000000-mapping.dmp
-
memory/4004-135-0x0000000000550000-0x0000000000559000-memory.dmpFilesize
36KB