Analysis
-
max time kernel
40s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 08:21
Static task
static1
Behavioral task
behavioral1
Sample
8000b6af72bea2ba6e7d56e8e66ccd5654a331fb9595eeb3975cc9d8ba715b92.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
8000b6af72bea2ba6e7d56e8e66ccd5654a331fb9595eeb3975cc9d8ba715b92.exe
Resource
win10v2004-20220414-en
General
-
Target
8000b6af72bea2ba6e7d56e8e66ccd5654a331fb9595eeb3975cc9d8ba715b92.exe
-
Size
198KB
-
MD5
8e186cd800df04de8a99e7681b9ceb8c
-
SHA1
6247b6a493d3757e2c3e566d7ada4042f4c6a862
-
SHA256
8000b6af72bea2ba6e7d56e8e66ccd5654a331fb9595eeb3975cc9d8ba715b92
-
SHA512
b5a9f9748ee92dbfd154b3516235d38c4e0d77c7ec71123a5d1fb36637fc446a11365742f9d5dc31a6f54a579e32ad48e75ef5f07e94280b897d488a72d7be90
Malware Config
Extracted
smokeloader
2018
http://xmpphost.bit/
http://rarlabarchiver.ru/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
8000b6af72bea2ba6e7d56e8e66ccd5654a331fb9595eeb3975cc9d8ba715b92.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 8000b6af72bea2ba6e7d56e8e66ccd5654a331fb9595eeb3975cc9d8ba715b92.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 8000b6af72bea2ba6e7d56e8e66ccd5654a331fb9595eeb3975cc9d8ba715b92.exe -
Checks SCSI registry key(s) 3 TTPs 2 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
8000b6af72bea2ba6e7d56e8e66ccd5654a331fb9595eeb3975cc9d8ba715b92.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8000b6af72bea2ba6e7d56e8e66ccd5654a331fb9595eeb3975cc9d8ba715b92.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8000b6af72bea2ba6e7d56e8e66ccd5654a331fb9595eeb3975cc9d8ba715b92.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
8000b6af72bea2ba6e7d56e8e66ccd5654a331fb9595eeb3975cc9d8ba715b92.exepid process 1032 8000b6af72bea2ba6e7d56e8e66ccd5654a331fb9595eeb3975cc9d8ba715b92.exe 1032 8000b6af72bea2ba6e7d56e8e66ccd5654a331fb9595eeb3975cc9d8ba715b92.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8000b6af72bea2ba6e7d56e8e66ccd5654a331fb9595eeb3975cc9d8ba715b92.exe"C:\Users\Admin\AppData\Local\Temp\8000b6af72bea2ba6e7d56e8e66ccd5654a331fb9595eeb3975cc9d8ba715b92.exe"1⤵
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1032-54-0x00000000758D1000-0x00000000758D3000-memory.dmpFilesize
8KB
-
memory/1032-55-0x0000000000400000-0x0000000004D92000-memory.dmpFilesize
73.6MB
-
memory/1032-57-0x0000000000020000-0x000000000002A000-memory.dmpFilesize
40KB
-
memory/1032-56-0x000000000026A000-0x0000000000273000-memory.dmpFilesize
36KB
-
memory/1032-59-0x0000000000400000-0x0000000004D92000-memory.dmpFilesize
73.6MB
-
memory/1208-58-0x0000000001CD0000-0x0000000001CE5000-memory.dmpFilesize
84KB