Analysis
-
max time kernel
150s -
max time network
67s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
16/09/2022, 01:23
Static task
static1
Behavioral task
behavioral1
Sample
90bcabce2aac7474901d763ae239d93c376fe1869aaf40c8242011fb077e8827.exe
Resource
win10-20220901-en
9 signatures
150 seconds
General
-
Target
90bcabce2aac7474901d763ae239d93c376fe1869aaf40c8242011fb077e8827.exe
-
Size
280KB
-
MD5
8fcad97aa3048165dc57ef91adb75ec5
-
SHA1
1ef5d0d2df8c86f3288f243f9709bd49df5c7ac9
-
SHA256
90bcabce2aac7474901d763ae239d93c376fe1869aaf40c8242011fb077e8827
-
SHA512
17ca9e295d2de681657ba8c64f7597f4b1f8844fc300510871f130e16a8d06375b510baaa264f9a009cd20e2e204505a8352a131009a39fe723c4efe0d3f0f5f
-
SSDEEP
6144:bdGiwkyYLjUMvitEu5NczriQYYfedI7ud5JV:bdkkyCjUMviVczriQYXdR7J
Score
10/10
Malware Config
Signatures
-
Detects Smokeloader packer 5 IoCs
resource yara_rule behavioral1/memory/2744-144-0x00000000001D0000-0x00000000001D9000-memory.dmp family_smokeloader behavioral1/memory/5052-149-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/5052-150-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/5052-160-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/5052-182-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 2364 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2744 set thread context of 5052 2744 90bcabce2aac7474901d763ae239d93c376fe1869aaf40c8242011fb077e8827.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 90bcabce2aac7474901d763ae239d93c376fe1869aaf40c8242011fb077e8827.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 90bcabce2aac7474901d763ae239d93c376fe1869aaf40c8242011fb077e8827.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 90bcabce2aac7474901d763ae239d93c376fe1869aaf40c8242011fb077e8827.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5052 90bcabce2aac7474901d763ae239d93c376fe1869aaf40c8242011fb077e8827.exe 5052 90bcabce2aac7474901d763ae239d93c376fe1869aaf40c8242011fb077e8827.exe 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found 2364 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2364 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5052 90bcabce2aac7474901d763ae239d93c376fe1869aaf40c8242011fb077e8827.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2744 wrote to memory of 5052 2744 90bcabce2aac7474901d763ae239d93c376fe1869aaf40c8242011fb077e8827.exe 66 PID 2744 wrote to memory of 5052 2744 90bcabce2aac7474901d763ae239d93c376fe1869aaf40c8242011fb077e8827.exe 66 PID 2744 wrote to memory of 5052 2744 90bcabce2aac7474901d763ae239d93c376fe1869aaf40c8242011fb077e8827.exe 66 PID 2744 wrote to memory of 5052 2744 90bcabce2aac7474901d763ae239d93c376fe1869aaf40c8242011fb077e8827.exe 66 PID 2744 wrote to memory of 5052 2744 90bcabce2aac7474901d763ae239d93c376fe1869aaf40c8242011fb077e8827.exe 66 PID 2744 wrote to memory of 5052 2744 90bcabce2aac7474901d763ae239d93c376fe1869aaf40c8242011fb077e8827.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\90bcabce2aac7474901d763ae239d93c376fe1869aaf40c8242011fb077e8827.exe"C:\Users\Admin\AppData\Local\Temp\90bcabce2aac7474901d763ae239d93c376fe1869aaf40c8242011fb077e8827.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\90bcabce2aac7474901d763ae239d93c376fe1869aaf40c8242011fb077e8827.exe"C:\Users\Admin\AppData\Local\Temp\90bcabce2aac7474901d763ae239d93c376fe1869aaf40c8242011fb077e8827.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5052
-