Analysis
-
max time kernel
153s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
20/09/2022, 19:05
Static task
static1
Behavioral task
behavioral1
Sample
06d2c872451ffd804e916b411cb99183806f9aeba83b3a7998d07061b59dfdf8.exe
Resource
win10-20220812-en
9 signatures
150 seconds
General
-
Target
06d2c872451ffd804e916b411cb99183806f9aeba83b3a7998d07061b59dfdf8.exe
-
Size
147KB
-
MD5
3a3145641b750be1c15d0a4491709172
-
SHA1
dc303f2d4918da64391e6e09e2aebda59343f8a3
-
SHA256
06d2c872451ffd804e916b411cb99183806f9aeba83b3a7998d07061b59dfdf8
-
SHA512
7ef86fbb18fbe4ae8f44e364f0161dcaaa4075eae432aa4644399a41ad5d886d3f30588674c881eb0993eebb6d9456562d6b14d8d1e513e156a01e9846dc3cfe
-
SSDEEP
3072:9d29GZ05Eu1XzZIf0DUhYI5mE1p+99BAzbzx:H35ulyf0IhY63bUA
Score
10/10
Malware Config
Signatures
-
Detects Smokeloader packer 4 IoCs
resource yara_rule behavioral1/memory/4792-145-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/4792-144-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4792-165-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4792-176-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1736 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2716 set thread context of 4792 2716 06d2c872451ffd804e916b411cb99183806f9aeba83b3a7998d07061b59dfdf8.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 06d2c872451ffd804e916b411cb99183806f9aeba83b3a7998d07061b59dfdf8.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 06d2c872451ffd804e916b411cb99183806f9aeba83b3a7998d07061b59dfdf8.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 06d2c872451ffd804e916b411cb99183806f9aeba83b3a7998d07061b59dfdf8.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4792 06d2c872451ffd804e916b411cb99183806f9aeba83b3a7998d07061b59dfdf8.exe 4792 06d2c872451ffd804e916b411cb99183806f9aeba83b3a7998d07061b59dfdf8.exe 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1736 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4792 06d2c872451ffd804e916b411cb99183806f9aeba83b3a7998d07061b59dfdf8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2716 wrote to memory of 4792 2716 06d2c872451ffd804e916b411cb99183806f9aeba83b3a7998d07061b59dfdf8.exe 66 PID 2716 wrote to memory of 4792 2716 06d2c872451ffd804e916b411cb99183806f9aeba83b3a7998d07061b59dfdf8.exe 66 PID 2716 wrote to memory of 4792 2716 06d2c872451ffd804e916b411cb99183806f9aeba83b3a7998d07061b59dfdf8.exe 66 PID 2716 wrote to memory of 4792 2716 06d2c872451ffd804e916b411cb99183806f9aeba83b3a7998d07061b59dfdf8.exe 66 PID 2716 wrote to memory of 4792 2716 06d2c872451ffd804e916b411cb99183806f9aeba83b3a7998d07061b59dfdf8.exe 66 PID 2716 wrote to memory of 4792 2716 06d2c872451ffd804e916b411cb99183806f9aeba83b3a7998d07061b59dfdf8.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\06d2c872451ffd804e916b411cb99183806f9aeba83b3a7998d07061b59dfdf8.exe"C:\Users\Admin\AppData\Local\Temp\06d2c872451ffd804e916b411cb99183806f9aeba83b3a7998d07061b59dfdf8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\06d2c872451ffd804e916b411cb99183806f9aeba83b3a7998d07061b59dfdf8.exe"C:\Users\Admin\AppData\Local\Temp\06d2c872451ffd804e916b411cb99183806f9aeba83b3a7998d07061b59dfdf8.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4792
-