Analysis
-
max time kernel
150s -
max time network
64s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
16-09-2022 13:47
Static task
static1
Behavioral task
behavioral1
Sample
d2373be5062b13474f20bfde76ec2066480254ac28611bf4745ae0baa76dfdf1.exe
Resource
win10-20220901-en
General
-
Target
d2373be5062b13474f20bfde76ec2066480254ac28611bf4745ae0baa76dfdf1.exe
-
Size
301KB
-
MD5
9c63eb402b40d9df82920de517a1dbf5
-
SHA1
49a120eb17407e4b5763131c252d26b86bd4ce0b
-
SHA256
d2373be5062b13474f20bfde76ec2066480254ac28611bf4745ae0baa76dfdf1
-
SHA512
e03b301c17660b45c0b9c2d624b168595239ede08d9d07e9945eb0306bfd6e847e57e79ea64c92db39f2b2c8d2905c59b4d3f1b5d7e1b21fd5fd22679d508e68
-
SSDEEP
3072:DVXokmOz7e9eXw2CzRTaCMbGTqixD+GjjE0K8jqGnH8FXM/h3BsxkgaBChU/pZaN:Nosjgdek+GjjE0Tp8FXnigabwVf
Malware Config
Signatures
-
Detects Smokeloader packer 8 IoCs
resource yara_rule behavioral1/memory/2744-147-0x0000000000570000-0x0000000000579000-memory.dmp family_smokeloader behavioral1/memory/4880-149-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4880-150-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/4880-161-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4880-182-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2852-278-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/2852-310-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2852-311-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 2748 javbrtw 2852 javbrtw -
Deletes itself 1 IoCs
pid Process 2108 Process not Found -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2744 set thread context of 4880 2744 d2373be5062b13474f20bfde76ec2066480254ac28611bf4745ae0baa76dfdf1.exe 66 PID 2748 set thread context of 2852 2748 javbrtw 68 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d2373be5062b13474f20bfde76ec2066480254ac28611bf4745ae0baa76dfdf1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d2373be5062b13474f20bfde76ec2066480254ac28611bf4745ae0baa76dfdf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI javbrtw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI javbrtw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI javbrtw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d2373be5062b13474f20bfde76ec2066480254ac28611bf4745ae0baa76dfdf1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4880 d2373be5062b13474f20bfde76ec2066480254ac28611bf4745ae0baa76dfdf1.exe 4880 d2373be5062b13474f20bfde76ec2066480254ac28611bf4745ae0baa76dfdf1.exe 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found 2108 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2108 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4880 d2373be5062b13474f20bfde76ec2066480254ac28611bf4745ae0baa76dfdf1.exe 2852 javbrtw -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeShutdownPrivilege 2108 Process not Found Token: SeCreatePagefilePrivilege 2108 Process not Found Token: SeShutdownPrivilege 2108 Process not Found Token: SeCreatePagefilePrivilege 2108 Process not Found Token: SeShutdownPrivilege 2108 Process not Found Token: SeCreatePagefilePrivilege 2108 Process not Found Token: SeShutdownPrivilege 2108 Process not Found Token: SeCreatePagefilePrivilege 2108 Process not Found Token: SeShutdownPrivilege 2108 Process not Found Token: SeCreatePagefilePrivilege 2108 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2744 wrote to memory of 4880 2744 d2373be5062b13474f20bfde76ec2066480254ac28611bf4745ae0baa76dfdf1.exe 66 PID 2744 wrote to memory of 4880 2744 d2373be5062b13474f20bfde76ec2066480254ac28611bf4745ae0baa76dfdf1.exe 66 PID 2744 wrote to memory of 4880 2744 d2373be5062b13474f20bfde76ec2066480254ac28611bf4745ae0baa76dfdf1.exe 66 PID 2744 wrote to memory of 4880 2744 d2373be5062b13474f20bfde76ec2066480254ac28611bf4745ae0baa76dfdf1.exe 66 PID 2744 wrote to memory of 4880 2744 d2373be5062b13474f20bfde76ec2066480254ac28611bf4745ae0baa76dfdf1.exe 66 PID 2744 wrote to memory of 4880 2744 d2373be5062b13474f20bfde76ec2066480254ac28611bf4745ae0baa76dfdf1.exe 66 PID 2748 wrote to memory of 2852 2748 javbrtw 68 PID 2748 wrote to memory of 2852 2748 javbrtw 68 PID 2748 wrote to memory of 2852 2748 javbrtw 68 PID 2748 wrote to memory of 2852 2748 javbrtw 68 PID 2748 wrote to memory of 2852 2748 javbrtw 68 PID 2748 wrote to memory of 2852 2748 javbrtw 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2373be5062b13474f20bfde76ec2066480254ac28611bf4745ae0baa76dfdf1.exe"C:\Users\Admin\AppData\Local\Temp\d2373be5062b13474f20bfde76ec2066480254ac28611bf4745ae0baa76dfdf1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\d2373be5062b13474f20bfde76ec2066480254ac28611bf4745ae0baa76dfdf1.exe"C:\Users\Admin\AppData\Local\Temp\d2373be5062b13474f20bfde76ec2066480254ac28611bf4745ae0baa76dfdf1.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4880
-
-
C:\Users\Admin\AppData\Roaming\javbrtwC:\Users\Admin\AppData\Roaming\javbrtw1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Roaming\javbrtwC:\Users\Admin\AppData\Roaming\javbrtw2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2852
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
301KB
MD59c63eb402b40d9df82920de517a1dbf5
SHA149a120eb17407e4b5763131c252d26b86bd4ce0b
SHA256d2373be5062b13474f20bfde76ec2066480254ac28611bf4745ae0baa76dfdf1
SHA512e03b301c17660b45c0b9c2d624b168595239ede08d9d07e9945eb0306bfd6e847e57e79ea64c92db39f2b2c8d2905c59b4d3f1b5d7e1b21fd5fd22679d508e68
-
Filesize
301KB
MD59c63eb402b40d9df82920de517a1dbf5
SHA149a120eb17407e4b5763131c252d26b86bd4ce0b
SHA256d2373be5062b13474f20bfde76ec2066480254ac28611bf4745ae0baa76dfdf1
SHA512e03b301c17660b45c0b9c2d624b168595239ede08d9d07e9945eb0306bfd6e847e57e79ea64c92db39f2b2c8d2905c59b4d3f1b5d7e1b21fd5fd22679d508e68
-
Filesize
301KB
MD59c63eb402b40d9df82920de517a1dbf5
SHA149a120eb17407e4b5763131c252d26b86bd4ce0b
SHA256d2373be5062b13474f20bfde76ec2066480254ac28611bf4745ae0baa76dfdf1
SHA512e03b301c17660b45c0b9c2d624b168595239ede08d9d07e9945eb0306bfd6e847e57e79ea64c92db39f2b2c8d2905c59b4d3f1b5d7e1b21fd5fd22679d508e68