Analysis
-
max time kernel
150s -
max time network
62s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
18/09/2022, 09:27
Static task
static1
Behavioral task
behavioral1
Sample
bb4b30ba0619fb1672fe95050742eaf51ef1fb8310c9aa0ce267ffff059a2a27.exe
Resource
win10-20220812-en
General
-
Target
bb4b30ba0619fb1672fe95050742eaf51ef1fb8310c9aa0ce267ffff059a2a27.exe
-
Size
289KB
-
MD5
4f0267828ff55742403114ef784c3899
-
SHA1
342fe9974b809a3eb792815ffbe148b2e3ccc0a0
-
SHA256
bb4b30ba0619fb1672fe95050742eaf51ef1fb8310c9aa0ce267ffff059a2a27
-
SHA512
d649d1a7bd51dfe712e4730f80cea611a692bff065698414c6552913088d239aca4fa4503638e9806bf5462cb718ad4e564311cfb44c73974543510c56dd3110
-
SSDEEP
6144:YyG5zLjYDves/3Vop1dtVa0lcNnigabwVff:Yy2z3YDveomrdWNiY
Malware Config
Signatures
-
Detects Smokeloader packer 8 IoCs
resource yara_rule behavioral1/memory/356-150-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/356-151-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/356-161-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/356-182-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2416-214-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/3408-221-0x00000000005A0000-0x00000000005A9000-memory.dmp family_smokeloader behavioral1/memory/2416-246-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2416-247-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 3408 uvshtar 2416 uvshtar -
Deletes itself 1 IoCs
pid Process 2312 Process not Found -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2204 set thread context of 356 2204 bb4b30ba0619fb1672fe95050742eaf51ef1fb8310c9aa0ce267ffff059a2a27.exe 66 PID 3408 set thread context of 2416 3408 uvshtar 68 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bb4b30ba0619fb1672fe95050742eaf51ef1fb8310c9aa0ce267ffff059a2a27.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bb4b30ba0619fb1672fe95050742eaf51ef1fb8310c9aa0ce267ffff059a2a27.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bb4b30ba0619fb1672fe95050742eaf51ef1fb8310c9aa0ce267ffff059a2a27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uvshtar Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uvshtar Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uvshtar -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 356 bb4b30ba0619fb1672fe95050742eaf51ef1fb8310c9aa0ce267ffff059a2a27.exe 356 bb4b30ba0619fb1672fe95050742eaf51ef1fb8310c9aa0ce267ffff059a2a27.exe 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found 2312 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2312 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 356 bb4b30ba0619fb1672fe95050742eaf51ef1fb8310c9aa0ce267ffff059a2a27.exe 2416 uvshtar -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2312 Process not Found Token: SeCreatePagefilePrivilege 2312 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2204 wrote to memory of 356 2204 bb4b30ba0619fb1672fe95050742eaf51ef1fb8310c9aa0ce267ffff059a2a27.exe 66 PID 2204 wrote to memory of 356 2204 bb4b30ba0619fb1672fe95050742eaf51ef1fb8310c9aa0ce267ffff059a2a27.exe 66 PID 2204 wrote to memory of 356 2204 bb4b30ba0619fb1672fe95050742eaf51ef1fb8310c9aa0ce267ffff059a2a27.exe 66 PID 2204 wrote to memory of 356 2204 bb4b30ba0619fb1672fe95050742eaf51ef1fb8310c9aa0ce267ffff059a2a27.exe 66 PID 2204 wrote to memory of 356 2204 bb4b30ba0619fb1672fe95050742eaf51ef1fb8310c9aa0ce267ffff059a2a27.exe 66 PID 2204 wrote to memory of 356 2204 bb4b30ba0619fb1672fe95050742eaf51ef1fb8310c9aa0ce267ffff059a2a27.exe 66 PID 3408 wrote to memory of 2416 3408 uvshtar 68 PID 3408 wrote to memory of 2416 3408 uvshtar 68 PID 3408 wrote to memory of 2416 3408 uvshtar 68 PID 3408 wrote to memory of 2416 3408 uvshtar 68 PID 3408 wrote to memory of 2416 3408 uvshtar 68 PID 3408 wrote to memory of 2416 3408 uvshtar 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb4b30ba0619fb1672fe95050742eaf51ef1fb8310c9aa0ce267ffff059a2a27.exe"C:\Users\Admin\AppData\Local\Temp\bb4b30ba0619fb1672fe95050742eaf51ef1fb8310c9aa0ce267ffff059a2a27.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\bb4b30ba0619fb1672fe95050742eaf51ef1fb8310c9aa0ce267ffff059a2a27.exe"C:\Users\Admin\AppData\Local\Temp\bb4b30ba0619fb1672fe95050742eaf51ef1fb8310c9aa0ce267ffff059a2a27.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:356
-
-
C:\Users\Admin\AppData\Roaming\uvshtarC:\Users\Admin\AppData\Roaming\uvshtar1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Roaming\uvshtarC:\Users\Admin\AppData\Roaming\uvshtar2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2416
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
289KB
MD54f0267828ff55742403114ef784c3899
SHA1342fe9974b809a3eb792815ffbe148b2e3ccc0a0
SHA256bb4b30ba0619fb1672fe95050742eaf51ef1fb8310c9aa0ce267ffff059a2a27
SHA512d649d1a7bd51dfe712e4730f80cea611a692bff065698414c6552913088d239aca4fa4503638e9806bf5462cb718ad4e564311cfb44c73974543510c56dd3110
-
Filesize
289KB
MD54f0267828ff55742403114ef784c3899
SHA1342fe9974b809a3eb792815ffbe148b2e3ccc0a0
SHA256bb4b30ba0619fb1672fe95050742eaf51ef1fb8310c9aa0ce267ffff059a2a27
SHA512d649d1a7bd51dfe712e4730f80cea611a692bff065698414c6552913088d239aca4fa4503638e9806bf5462cb718ad4e564311cfb44c73974543510c56dd3110
-
Filesize
289KB
MD54f0267828ff55742403114ef784c3899
SHA1342fe9974b809a3eb792815ffbe148b2e3ccc0a0
SHA256bb4b30ba0619fb1672fe95050742eaf51ef1fb8310c9aa0ce267ffff059a2a27
SHA512d649d1a7bd51dfe712e4730f80cea611a692bff065698414c6552913088d239aca4fa4503638e9806bf5462cb718ad4e564311cfb44c73974543510c56dd3110