Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
10-09-2022 16:19
Static task
static1
Behavioral task
behavioral1
Sample
95dfd8e5c7517481bc3e1bb073332406efd2c18a37b42bc9b285b3a2bbf89ba1.exe
Resource
win10-20220812-en
windows10-1703-x64
8 signatures
150 seconds
General
-
Target
95dfd8e5c7517481bc3e1bb073332406efd2c18a37b42bc9b285b3a2bbf89ba1.exe
-
Size
307KB
-
MD5
293bd0f30fd7d02051e1fe1c374f5f32
-
SHA1
45e7bdbe42204997ff9d1a9c97b279d786b5276e
-
SHA256
95dfd8e5c7517481bc3e1bb073332406efd2c18a37b42bc9b285b3a2bbf89ba1
-
SHA512
6ca98073a598dbd7c9ac5792a74884b78343817c75a125ef99262b949caea5fc25282090604ae8c3a54563d057e3eaceade5cb47026e4985df51e7a0d16d555e
-
SSDEEP
6144:dvEF4d0tHH5BQDQpcazaxTgFddHDHqSobkqVBSgmvF/NZJp:J3d0B52ocgaxTgFd1KSobtVmd3
Score
10/10
Malware Config
Signatures
-
Detects Smokeloader packer 5 IoCs
resource yara_rule behavioral1/memory/2204-148-0x00000000001C0000-0x00000000001C9000-memory.dmp family_smokeloader behavioral1/memory/2732-150-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2732-151-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/2732-160-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2732-183-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 2312 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2204 set thread context of 2732 2204 95dfd8e5c7517481bc3e1bb073332406efd2c18a37b42bc9b285b3a2bbf89ba1.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 95dfd8e5c7517481bc3e1bb073332406efd2c18a37b42bc9b285b3a2bbf89ba1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 95dfd8e5c7517481bc3e1bb073332406efd2c18a37b42bc9b285b3a2bbf89ba1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 95dfd8e5c7517481bc3e1bb073332406efd2c18a37b42bc9b285b3a2bbf89ba1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2732 95dfd8e5c7517481bc3e1bb073332406efd2c18a37b42bc9b285b3a2bbf89ba1.exe 2732 95dfd8e5c7517481bc3e1bb073332406efd2c18a37b42bc9b285b3a2bbf89ba1.exe 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2732 95dfd8e5c7517481bc3e1bb073332406efd2c18a37b42bc9b285b3a2bbf89ba1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2732 2204 95dfd8e5c7517481bc3e1bb073332406efd2c18a37b42bc9b285b3a2bbf89ba1.exe 66 PID 2204 wrote to memory of 2732 2204 95dfd8e5c7517481bc3e1bb073332406efd2c18a37b42bc9b285b3a2bbf89ba1.exe 66 PID 2204 wrote to memory of 2732 2204 95dfd8e5c7517481bc3e1bb073332406efd2c18a37b42bc9b285b3a2bbf89ba1.exe 66 PID 2204 wrote to memory of 2732 2204 95dfd8e5c7517481bc3e1bb073332406efd2c18a37b42bc9b285b3a2bbf89ba1.exe 66 PID 2204 wrote to memory of 2732 2204 95dfd8e5c7517481bc3e1bb073332406efd2c18a37b42bc9b285b3a2bbf89ba1.exe 66 PID 2204 wrote to memory of 2732 2204 95dfd8e5c7517481bc3e1bb073332406efd2c18a37b42bc9b285b3a2bbf89ba1.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\95dfd8e5c7517481bc3e1bb073332406efd2c18a37b42bc9b285b3a2bbf89ba1.exe"C:\Users\Admin\AppData\Local\Temp\95dfd8e5c7517481bc3e1bb073332406efd2c18a37b42bc9b285b3a2bbf89ba1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\95dfd8e5c7517481bc3e1bb073332406efd2c18a37b42bc9b285b3a2bbf89ba1.exe"C:\Users\Admin\AppData\Local\Temp\95dfd8e5c7517481bc3e1bb073332406efd2c18a37b42bc9b285b3a2bbf89ba1.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2732
-