Analysis

  • max time kernel
    151s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/09/2022, 16:57

General

  • Target

    file.exe

  • Size

    260KB

  • MD5

    83ca70c3420b49ccf0d47833b060b54a

  • SHA1

    a2f2ff8b5abc6f956f9445e55aad7a4ba5209376

  • SHA256

    f08c4a88d0ab8357a77e7a526d1cac3df9fe442f42799c6e29d43acc6b97ff06

  • SHA512

    d4b7d9316ad817d9d3f5781fb699a1ea6268305cc9850cd9860a8af626193f0f870506eed2d24f18399fb47c7a27917fd66c938852620ae283ce71c407362d7e

  • SSDEEP

    6144:EQVp7Z04DitVgHxaqJuXbUG6Zk4jNI3mLxc4xcc6:RVpm4ezKxnJuXbSZkSDc4xN6

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2056-140-0x0000000000A80000-0x0000000000A90000-memory.dmp

    Filesize

    64KB

  • memory/2056-141-0x0000000002370000-0x0000000002380000-memory.dmp

    Filesize

    64KB

  • memory/2056-147-0x0000000002D10000-0x0000000002D20000-memory.dmp

    Filesize

    64KB

  • memory/2056-146-0x0000000002D10000-0x0000000002D20000-memory.dmp

    Filesize

    64KB

  • memory/2056-136-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-137-0x0000000000A80000-0x0000000000A90000-memory.dmp

    Filesize

    64KB

  • memory/2056-145-0x0000000007F10000-0x0000000007F20000-memory.dmp

    Filesize

    64KB

  • memory/2056-138-0x0000000002370000-0x0000000002380000-memory.dmp

    Filesize

    64KB

  • memory/2056-144-0x0000000002E60000-0x0000000002E70000-memory.dmp

    Filesize

    64KB

  • memory/2056-139-0x0000000002370000-0x0000000002380000-memory.dmp

    Filesize

    64KB

  • memory/2056-142-0x0000000002370000-0x0000000002380000-memory.dmp

    Filesize

    64KB

  • memory/2056-143-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/4784-132-0x0000000000879000-0x0000000000889000-memory.dmp

    Filesize

    64KB

  • memory/4784-133-0x0000000000850000-0x0000000000859000-memory.dmp

    Filesize

    36KB

  • memory/4784-135-0x0000000000400000-0x0000000000844000-memory.dmp

    Filesize

    4.3MB

  • memory/4784-134-0x0000000000400000-0x0000000000844000-memory.dmp

    Filesize

    4.3MB