Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
09-09-2022 18:28
Static task
static1
Behavioral task
behavioral1
Sample
461d005b1dfa92a781fea1bc3242f4fd94f3cadb105fbb45baf75ff728551378.exe
Resource
win10-20220812-en
General
-
Target
461d005b1dfa92a781fea1bc3242f4fd94f3cadb105fbb45baf75ff728551378.exe
-
Size
207KB
-
MD5
803df6aa55e68949c44f10d2c4e75129
-
SHA1
27a718129a9e61ec233a605013c3f62ec7945079
-
SHA256
461d005b1dfa92a781fea1bc3242f4fd94f3cadb105fbb45baf75ff728551378
-
SHA512
5d56c50c9b61ba4ec5fbf7185015771e1a88f8ac669c08e3c78977d442aec079bba3bb239c2781e44c411d74dee37b68d2a776fda659f24b417931abc758db6e
-
SSDEEP
3072:k8HIIHFO2l5vlo2/573mRZZ/tvvkrteFkoqiURx:dHFtl5NomGpIjx
Malware Config
Signatures
-
Detects Smokeloader packer 8 IoCs
resource yara_rule behavioral1/memory/2656-142-0x0000000002CE0000-0x0000000002CE9000-memory.dmp family_smokeloader behavioral1/memory/3980-145-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/3980-144-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3980-158-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3980-177-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/1156-209-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/1156-240-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/1156-241-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 4672 gbsjhac 1156 gbsjhac -
Deletes itself 1 IoCs
pid Process 3032 Process not Found -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2656 set thread context of 3980 2656 461d005b1dfa92a781fea1bc3242f4fd94f3cadb105fbb45baf75ff728551378.exe 66 PID 4672 set thread context of 1156 4672 gbsjhac 68 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 461d005b1dfa92a781fea1bc3242f4fd94f3cadb105fbb45baf75ff728551378.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 461d005b1dfa92a781fea1bc3242f4fd94f3cadb105fbb45baf75ff728551378.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gbsjhac Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gbsjhac Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gbsjhac Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 461d005b1dfa92a781fea1bc3242f4fd94f3cadb105fbb45baf75ff728551378.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3980 461d005b1dfa92a781fea1bc3242f4fd94f3cadb105fbb45baf75ff728551378.exe 3980 461d005b1dfa92a781fea1bc3242f4fd94f3cadb105fbb45baf75ff728551378.exe 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3032 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3980 461d005b1dfa92a781fea1bc3242f4fd94f3cadb105fbb45baf75ff728551378.exe 1156 gbsjhac -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3032 Process not Found Token: SeCreatePagefilePrivilege 3032 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2656 wrote to memory of 3980 2656 461d005b1dfa92a781fea1bc3242f4fd94f3cadb105fbb45baf75ff728551378.exe 66 PID 2656 wrote to memory of 3980 2656 461d005b1dfa92a781fea1bc3242f4fd94f3cadb105fbb45baf75ff728551378.exe 66 PID 2656 wrote to memory of 3980 2656 461d005b1dfa92a781fea1bc3242f4fd94f3cadb105fbb45baf75ff728551378.exe 66 PID 2656 wrote to memory of 3980 2656 461d005b1dfa92a781fea1bc3242f4fd94f3cadb105fbb45baf75ff728551378.exe 66 PID 2656 wrote to memory of 3980 2656 461d005b1dfa92a781fea1bc3242f4fd94f3cadb105fbb45baf75ff728551378.exe 66 PID 2656 wrote to memory of 3980 2656 461d005b1dfa92a781fea1bc3242f4fd94f3cadb105fbb45baf75ff728551378.exe 66 PID 4672 wrote to memory of 1156 4672 gbsjhac 68 PID 4672 wrote to memory of 1156 4672 gbsjhac 68 PID 4672 wrote to memory of 1156 4672 gbsjhac 68 PID 4672 wrote to memory of 1156 4672 gbsjhac 68 PID 4672 wrote to memory of 1156 4672 gbsjhac 68 PID 4672 wrote to memory of 1156 4672 gbsjhac 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\461d005b1dfa92a781fea1bc3242f4fd94f3cadb105fbb45baf75ff728551378.exe"C:\Users\Admin\AppData\Local\Temp\461d005b1dfa92a781fea1bc3242f4fd94f3cadb105fbb45baf75ff728551378.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\461d005b1dfa92a781fea1bc3242f4fd94f3cadb105fbb45baf75ff728551378.exe"C:\Users\Admin\AppData\Local\Temp\461d005b1dfa92a781fea1bc3242f4fd94f3cadb105fbb45baf75ff728551378.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3980
-
-
C:\Users\Admin\AppData\Roaming\gbsjhacC:\Users\Admin\AppData\Roaming\gbsjhac1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Roaming\gbsjhacC:\Users\Admin\AppData\Roaming\gbsjhac2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1156
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD5803df6aa55e68949c44f10d2c4e75129
SHA127a718129a9e61ec233a605013c3f62ec7945079
SHA256461d005b1dfa92a781fea1bc3242f4fd94f3cadb105fbb45baf75ff728551378
SHA5125d56c50c9b61ba4ec5fbf7185015771e1a88f8ac669c08e3c78977d442aec079bba3bb239c2781e44c411d74dee37b68d2a776fda659f24b417931abc758db6e
-
Filesize
207KB
MD5803df6aa55e68949c44f10d2c4e75129
SHA127a718129a9e61ec233a605013c3f62ec7945079
SHA256461d005b1dfa92a781fea1bc3242f4fd94f3cadb105fbb45baf75ff728551378
SHA5125d56c50c9b61ba4ec5fbf7185015771e1a88f8ac669c08e3c78977d442aec079bba3bb239c2781e44c411d74dee37b68d2a776fda659f24b417931abc758db6e
-
Filesize
207KB
MD5803df6aa55e68949c44f10d2c4e75129
SHA127a718129a9e61ec233a605013c3f62ec7945079
SHA256461d005b1dfa92a781fea1bc3242f4fd94f3cadb105fbb45baf75ff728551378
SHA5125d56c50c9b61ba4ec5fbf7185015771e1a88f8ac669c08e3c78977d442aec079bba3bb239c2781e44c411d74dee37b68d2a776fda659f24b417931abc758db6e