Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-09-2022 08:48

General

  • Target

    SecuriteInfo.com.Win32.Evo-gen.3516.exe

  • Size

    205KB

  • MD5

    25b720892cfe397922655358e7f21641

  • SHA1

    23afdd7f3b8240b20f3a9b9f491ea90fbc34a042

  • SHA256

    9c7bbc19d6eb9e508afad47c3f73b7a7eb8c76fed6cdc3db5881221e3ac4078d

  • SHA512

    f85627194dd3668f39d40cf4edf1221782d2135ad9bf8c7a1a90342e97b30423cef2a9c33c74f7cc88d01cf1ee47da9fcd5539a131bc45a4bf7511008e4a8a53

  • SSDEEP

    3072:9Sq/CIiZjLDr651ucsAWmsKob+0Exx5Cs57T8g+TJa7tXlY:hqjfUuxATmb+zx5CuT81TJ

Malware Config

Signatures

  • Detects Smokeloader packer 6 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.3516.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.3516.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3972
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.3516.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.3516.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:520
  • C:\Users\Admin\AppData\Roaming\csgbaff
    C:\Users\Admin\AppData\Roaming\csgbaff
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2832
    • C:\Users\Admin\AppData\Roaming\csgbaff
      C:\Users\Admin\AppData\Roaming\csgbaff
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:820

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\csgbaff

    Filesize

    205KB

    MD5

    25b720892cfe397922655358e7f21641

    SHA1

    23afdd7f3b8240b20f3a9b9f491ea90fbc34a042

    SHA256

    9c7bbc19d6eb9e508afad47c3f73b7a7eb8c76fed6cdc3db5881221e3ac4078d

    SHA512

    f85627194dd3668f39d40cf4edf1221782d2135ad9bf8c7a1a90342e97b30423cef2a9c33c74f7cc88d01cf1ee47da9fcd5539a131bc45a4bf7511008e4a8a53

  • C:\Users\Admin\AppData\Roaming\csgbaff

    Filesize

    205KB

    MD5

    25b720892cfe397922655358e7f21641

    SHA1

    23afdd7f3b8240b20f3a9b9f491ea90fbc34a042

    SHA256

    9c7bbc19d6eb9e508afad47c3f73b7a7eb8c76fed6cdc3db5881221e3ac4078d

    SHA512

    f85627194dd3668f39d40cf4edf1221782d2135ad9bf8c7a1a90342e97b30423cef2a9c33c74f7cc88d01cf1ee47da9fcd5539a131bc45a4bf7511008e4a8a53

  • C:\Users\Admin\AppData\Roaming\csgbaff

    Filesize

    205KB

    MD5

    25b720892cfe397922655358e7f21641

    SHA1

    23afdd7f3b8240b20f3a9b9f491ea90fbc34a042

    SHA256

    9c7bbc19d6eb9e508afad47c3f73b7a7eb8c76fed6cdc3db5881221e3ac4078d

    SHA512

    f85627194dd3668f39d40cf4edf1221782d2135ad9bf8c7a1a90342e97b30423cef2a9c33c74f7cc88d01cf1ee47da9fcd5539a131bc45a4bf7511008e4a8a53

  • memory/520-132-0x0000000000000000-mapping.dmp

  • memory/520-133-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/520-136-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/520-137-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/820-194-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/820-193-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/820-189-0x0000000000000000-mapping.dmp

  • memory/2056-152-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-179-0x0000000002CD0000-0x0000000002CE0000-memory.dmp

    Filesize

    64KB

  • memory/2056-144-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-145-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-146-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-147-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-148-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-149-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-150-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-151-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-142-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-153-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-154-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-155-0x0000000007C00000-0x0000000007C10000-memory.dmp

    Filesize

    64KB

  • memory/2056-156-0x0000000007C20000-0x0000000007C30000-memory.dmp

    Filesize

    64KB

  • memory/2056-157-0x0000000007C20000-0x0000000007C30000-memory.dmp

    Filesize

    64KB

  • memory/2056-158-0x0000000007C20000-0x0000000007C30000-memory.dmp

    Filesize

    64KB

  • memory/2056-159-0x0000000007C20000-0x0000000007C30000-memory.dmp

    Filesize

    64KB

  • memory/2056-160-0x0000000007C20000-0x0000000007C30000-memory.dmp

    Filesize

    64KB

  • memory/2056-161-0x0000000007C20000-0x0000000007C30000-memory.dmp

    Filesize

    64KB

  • memory/2056-162-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-163-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-164-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-165-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-166-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-167-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-168-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-169-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-170-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-171-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-172-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-173-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-174-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-175-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-176-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-177-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-178-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-143-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-180-0x0000000002CE0000-0x0000000002CF0000-memory.dmp

    Filesize

    64KB

  • memory/2056-181-0x0000000002CE0000-0x0000000002CF0000-memory.dmp

    Filesize

    64KB

  • memory/2056-182-0x0000000002CE0000-0x0000000002CF0000-memory.dmp

    Filesize

    64KB

  • memory/2056-183-0x0000000002CD0000-0x0000000002CE0000-memory.dmp

    Filesize

    64KB

  • memory/2056-184-0x0000000002CE0000-0x0000000002CF0000-memory.dmp

    Filesize

    64KB

  • memory/2056-185-0x0000000002CE0000-0x0000000002CF0000-memory.dmp

    Filesize

    64KB

  • memory/2056-186-0x0000000002CE0000-0x0000000002CF0000-memory.dmp

    Filesize

    64KB

  • memory/2056-141-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-140-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-139-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-138-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-215-0x0000000002380000-0x0000000002390000-memory.dmp

    Filesize

    64KB

  • memory/2056-214-0x0000000002380000-0x0000000002390000-memory.dmp

    Filesize

    64KB

  • memory/2056-213-0x00000000023A0000-0x00000000023B0000-memory.dmp

    Filesize

    64KB

  • memory/2056-195-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-196-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-197-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-198-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-199-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-200-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-201-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-202-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-203-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-204-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-205-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-206-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-207-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-208-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-209-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-210-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-211-0x0000000007BF0000-0x0000000007C00000-memory.dmp

    Filesize

    64KB

  • memory/2056-212-0x0000000002370000-0x0000000002380000-memory.dmp

    Filesize

    64KB

  • memory/2832-192-0x0000000002E49000-0x0000000002E59000-memory.dmp

    Filesize

    64KB

  • memory/3972-135-0x0000000002E10000-0x0000000002E19000-memory.dmp

    Filesize

    36KB

  • memory/3972-134-0x0000000002EB9000-0x0000000002EC9000-memory.dmp

    Filesize

    64KB