Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10/09/2022, 14:38
Static task
static1
Behavioral task
behavioral1
Sample
af0e68bf077553846f8609d9758353668ca65d286598bfeb72bbb356d3a80aff.exe
Resource
win10v2004-20220812-en
General
-
Target
af0e68bf077553846f8609d9758353668ca65d286598bfeb72bbb356d3a80aff.exe
-
Size
307KB
-
MD5
c9b50ad82e895d763714b3e1626236b1
-
SHA1
72d58fe29dd7f80a0424eb524a09110434dedcb2
-
SHA256
af0e68bf077553846f8609d9758353668ca65d286598bfeb72bbb356d3a80aff
-
SHA512
40ffa94d053f9ec88bdbb29ca6864d69d5b9a22dc8ec5537f6e5de451a5615523accc615498dff3daf6e0d59e011f38ea934eadf31b0513db53113686dfb5c6f
-
SSDEEP
6144:h+Z+JI7HHpvSbz+9samSxOO3wba4v2TQGCVKmVHMxYJt1s:h3JI7hSv+sBoOO3wba4vLGyKwHlJt
Malware Config
Signatures
-
Detects Smokeloader packer 6 IoCs
resource yara_rule behavioral1/memory/1884-133-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4540-135-0x0000000002520000-0x0000000002529000-memory.dmp family_smokeloader behavioral1/memory/1884-136-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/1884-137-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3108-144-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3108-145-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 4124 viaudjf 3108 viaudjf -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4540 set thread context of 1884 4540 af0e68bf077553846f8609d9758353668ca65d286598bfeb72bbb356d3a80aff.exe 85 PID 4124 set thread context of 3108 4124 viaudjf 95 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI af0e68bf077553846f8609d9758353668ca65d286598bfeb72bbb356d3a80aff.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI af0e68bf077553846f8609d9758353668ca65d286598bfeb72bbb356d3a80aff.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI af0e68bf077553846f8609d9758353668ca65d286598bfeb72bbb356d3a80aff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI viaudjf Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI viaudjf Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI viaudjf -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1884 af0e68bf077553846f8609d9758353668ca65d286598bfeb72bbb356d3a80aff.exe 1884 af0e68bf077553846f8609d9758353668ca65d286598bfeb72bbb356d3a80aff.exe 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found 532 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 532 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1884 af0e68bf077553846f8609d9758353668ca65d286598bfeb72bbb356d3a80aff.exe 3108 viaudjf -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 532 Process not Found Token: SeCreatePagefilePrivilege 532 Process not Found Token: SeShutdownPrivilege 532 Process not Found Token: SeCreatePagefilePrivilege 532 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 532 Process not Found 532 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4540 wrote to memory of 1884 4540 af0e68bf077553846f8609d9758353668ca65d286598bfeb72bbb356d3a80aff.exe 85 PID 4540 wrote to memory of 1884 4540 af0e68bf077553846f8609d9758353668ca65d286598bfeb72bbb356d3a80aff.exe 85 PID 4540 wrote to memory of 1884 4540 af0e68bf077553846f8609d9758353668ca65d286598bfeb72bbb356d3a80aff.exe 85 PID 4540 wrote to memory of 1884 4540 af0e68bf077553846f8609d9758353668ca65d286598bfeb72bbb356d3a80aff.exe 85 PID 4540 wrote to memory of 1884 4540 af0e68bf077553846f8609d9758353668ca65d286598bfeb72bbb356d3a80aff.exe 85 PID 4540 wrote to memory of 1884 4540 af0e68bf077553846f8609d9758353668ca65d286598bfeb72bbb356d3a80aff.exe 85 PID 4124 wrote to memory of 3108 4124 viaudjf 95 PID 4124 wrote to memory of 3108 4124 viaudjf 95 PID 4124 wrote to memory of 3108 4124 viaudjf 95 PID 4124 wrote to memory of 3108 4124 viaudjf 95 PID 4124 wrote to memory of 3108 4124 viaudjf 95 PID 4124 wrote to memory of 3108 4124 viaudjf 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\af0e68bf077553846f8609d9758353668ca65d286598bfeb72bbb356d3a80aff.exe"C:\Users\Admin\AppData\Local\Temp\af0e68bf077553846f8609d9758353668ca65d286598bfeb72bbb356d3a80aff.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\af0e68bf077553846f8609d9758353668ca65d286598bfeb72bbb356d3a80aff.exe"C:\Users\Admin\AppData\Local\Temp\af0e68bf077553846f8609d9758353668ca65d286598bfeb72bbb356d3a80aff.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1884
-
-
C:\Users\Admin\AppData\Roaming\viaudjfC:\Users\Admin\AppData\Roaming\viaudjf1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Roaming\viaudjfC:\Users\Admin\AppData\Roaming\viaudjf2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3108
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD5c9b50ad82e895d763714b3e1626236b1
SHA172d58fe29dd7f80a0424eb524a09110434dedcb2
SHA256af0e68bf077553846f8609d9758353668ca65d286598bfeb72bbb356d3a80aff
SHA51240ffa94d053f9ec88bdbb29ca6864d69d5b9a22dc8ec5537f6e5de451a5615523accc615498dff3daf6e0d59e011f38ea934eadf31b0513db53113686dfb5c6f
-
Filesize
307KB
MD5c9b50ad82e895d763714b3e1626236b1
SHA172d58fe29dd7f80a0424eb524a09110434dedcb2
SHA256af0e68bf077553846f8609d9758353668ca65d286598bfeb72bbb356d3a80aff
SHA51240ffa94d053f9ec88bdbb29ca6864d69d5b9a22dc8ec5537f6e5de451a5615523accc615498dff3daf6e0d59e011f38ea934eadf31b0513db53113686dfb5c6f
-
Filesize
307KB
MD5c9b50ad82e895d763714b3e1626236b1
SHA172d58fe29dd7f80a0424eb524a09110434dedcb2
SHA256af0e68bf077553846f8609d9758353668ca65d286598bfeb72bbb356d3a80aff
SHA51240ffa94d053f9ec88bdbb29ca6864d69d5b9a22dc8ec5537f6e5de451a5615523accc615498dff3daf6e0d59e011f38ea934eadf31b0513db53113686dfb5c6f