Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
12/09/2022, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
5d90a338072c509a7b40b56150aae3696d0795b7e14e169a2a9f0e88a52fde0d.exe
Resource
win10-20220812-en
General
-
Target
5d90a338072c509a7b40b56150aae3696d0795b7e14e169a2a9f0e88a52fde0d.exe
-
Size
266KB
-
MD5
acbc345e85eb0695842a02f5bc166f24
-
SHA1
7e0bc482b73104529b36641c237dff8d05983b1c
-
SHA256
5d90a338072c509a7b40b56150aae3696d0795b7e14e169a2a9f0e88a52fde0d
-
SHA512
872677741c7b29da0643a25b02519d2576b75f27482a663f5fbe2990eac6fc3661f523632e11613c29615e66d00f893ad99cee0e293691ffc1fb4850d4d1826b
-
SSDEEP
6144:+OYz1Eio8bZlvAFAQwwNvBw3mHtux6Ra6Ai:XUEio8lZAFAQwwN2WHw6
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/1788-146-0x00000000001C0000-0x00000000001C9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 3796 80E3.exe -
Deletes itself 1 IoCs
pid Process 3024 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5d90a338072c509a7b40b56150aae3696d0795b7e14e169a2a9f0e88a52fde0d.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5d90a338072c509a7b40b56150aae3696d0795b7e14e169a2a9f0e88a52fde0d.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5d90a338072c509a7b40b56150aae3696d0795b7e14e169a2a9f0e88a52fde0d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1788 5d90a338072c509a7b40b56150aae3696d0795b7e14e169a2a9f0e88a52fde0d.exe 1788 5d90a338072c509a7b40b56150aae3696d0795b7e14e169a2a9f0e88a52fde0d.exe 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3024 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1788 5d90a338072c509a7b40b56150aae3696d0795b7e14e169a2a9f0e88a52fde0d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3024 wrote to memory of 3796 3024 Process not Found 66 PID 3024 wrote to memory of 3796 3024 Process not Found 66 PID 3024 wrote to memory of 3796 3024 Process not Found 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d90a338072c509a7b40b56150aae3696d0795b7e14e169a2a9f0e88a52fde0d.exe"C:\Users\Admin\AppData\Local\Temp\5d90a338072c509a7b40b56150aae3696d0795b7e14e169a2a9f0e88a52fde0d.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1788
-
C:\Users\Admin\AppData\Local\Temp\80E3.exeC:\Users\Admin\AppData\Local\Temp\80E3.exe1⤵
- Executes dropped EXE
PID:3796
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD568112d6e256fb5eff29fba569ae9ad41
SHA14c4f51dd54068e5662e848f8ab47e4a4ef006118
SHA256aa227a9c192107043d5ce66b6058adc5454dcc0100c7cc9da777ce97e2da6cc2
SHA512a8a687b5c3dab33c15ffc29b8c4998168de3b39b62674550688bcde8be1df2e6fb7d4da7a3cc9a220e01b3c629deabf94e1aa910479a9f68db72c61390b25bc3
-
Filesize
2.4MB
MD568112d6e256fb5eff29fba569ae9ad41
SHA14c4f51dd54068e5662e848f8ab47e4a4ef006118
SHA256aa227a9c192107043d5ce66b6058adc5454dcc0100c7cc9da777ce97e2da6cc2
SHA512a8a687b5c3dab33c15ffc29b8c4998168de3b39b62674550688bcde8be1df2e6fb7d4da7a3cc9a220e01b3c629deabf94e1aa910479a9f68db72c61390b25bc3