Analysis
-
max time kernel
150s -
max time network
62s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
08/09/2022, 06:34
Static task
static1
Behavioral task
behavioral1
Sample
e5a21494f94d875629ff61533dedea182f11864a8367a06a942cd3441d475a14.exe
Resource
win10-20220812-en
9 signatures
150 seconds
General
-
Target
e5a21494f94d875629ff61533dedea182f11864a8367a06a942cd3441d475a14.exe
-
Size
244KB
-
MD5
1952a5ba5078b3fed49374cd1b46f219
-
SHA1
754cccff3803b75d7251eaf8f8c2488f92746519
-
SHA256
e5a21494f94d875629ff61533dedea182f11864a8367a06a942cd3441d475a14
-
SHA512
6ea96b5e61d6f35ac2702a8ac481036ea13665afad1cb18a325c05ab97e86ce0b084e42ccecef62c611a71d8a0e8ab09f699c65455a050f785f584ebbb706e7e
-
SSDEEP
6144:aYstvoDABjJMtO0tcLMHpkBvmYafIKh9Hp+RJ2Wye9zP8c:aY+oClMtWyIKLp+RJ2Wh4
Score
10/10
Malware Config
Signatures
-
Detects Smokeloader packer 4 IoCs
resource yara_rule behavioral1/memory/2148-144-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2148-145-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/2148-156-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2148-177-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 2288 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4200 set thread context of 2148 4200 e5a21494f94d875629ff61533dedea182f11864a8367a06a942cd3441d475a14.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e5a21494f94d875629ff61533dedea182f11864a8367a06a942cd3441d475a14.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e5a21494f94d875629ff61533dedea182f11864a8367a06a942cd3441d475a14.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e5a21494f94d875629ff61533dedea182f11864a8367a06a942cd3441d475a14.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2148 e5a21494f94d875629ff61533dedea182f11864a8367a06a942cd3441d475a14.exe 2148 e5a21494f94d875629ff61533dedea182f11864a8367a06a942cd3441d475a14.exe 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found 2288 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2288 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2148 e5a21494f94d875629ff61533dedea182f11864a8367a06a942cd3441d475a14.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4200 wrote to memory of 2148 4200 e5a21494f94d875629ff61533dedea182f11864a8367a06a942cd3441d475a14.exe 66 PID 4200 wrote to memory of 2148 4200 e5a21494f94d875629ff61533dedea182f11864a8367a06a942cd3441d475a14.exe 66 PID 4200 wrote to memory of 2148 4200 e5a21494f94d875629ff61533dedea182f11864a8367a06a942cd3441d475a14.exe 66 PID 4200 wrote to memory of 2148 4200 e5a21494f94d875629ff61533dedea182f11864a8367a06a942cd3441d475a14.exe 66 PID 4200 wrote to memory of 2148 4200 e5a21494f94d875629ff61533dedea182f11864a8367a06a942cd3441d475a14.exe 66 PID 4200 wrote to memory of 2148 4200 e5a21494f94d875629ff61533dedea182f11864a8367a06a942cd3441d475a14.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5a21494f94d875629ff61533dedea182f11864a8367a06a942cd3441d475a14.exe"C:\Users\Admin\AppData\Local\Temp\e5a21494f94d875629ff61533dedea182f11864a8367a06a942cd3441d475a14.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\e5a21494f94d875629ff61533dedea182f11864a8367a06a942cd3441d475a14.exe"C:\Users\Admin\AppData\Local\Temp\e5a21494f94d875629ff61533dedea182f11864a8367a06a942cd3441d475a14.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2148
-