Analysis
-
max time kernel
151s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2022 10:15
Static task
static1
Behavioral task
behavioral1
Sample
0daeead53363aa5700928e038323bd114acb92b9b9e0139a06a9b0809388180c.exe
Resource
win10v2004-20220901-en
windows10-2004-x64
9 signatures
150 seconds
General
-
Target
0daeead53363aa5700928e038323bd114acb92b9b9e0139a06a9b0809388180c.exe
-
Size
148KB
-
MD5
4660ed492206278e101f3afabdc97ddb
-
SHA1
4b4beee8634e120f246efcef82910abadc8e4cd9
-
SHA256
0daeead53363aa5700928e038323bd114acb92b9b9e0139a06a9b0809388180c
-
SHA512
30162ee49f5460ab1e765d6b03688ef7fce3fd5b76b7179e0eefd540f8619564c5fe50359be6304d897020f155360589bff3a826abb798b0517b224f3f83e1aa
-
SSDEEP
3072:g9875NlvnNKVNUXPHyQpm9Ilf+BUEwNUBHMIn:PvNJ/yN9IlfE6UBH
Score
10/10
Malware Config
Signatures
-
Detects Smokeloader packer 4 IoCs
resource yara_rule behavioral1/memory/1884-133-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4628-135-0x00000000022B0000-0x00000000022B9000-memory.dmp family_smokeloader behavioral1/memory/1884-136-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/1884-137-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4628 set thread context of 1884 4628 0daeead53363aa5700928e038323bd114acb92b9b9e0139a06a9b0809388180c.exe 85 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0daeead53363aa5700928e038323bd114acb92b9b9e0139a06a9b0809388180c.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0daeead53363aa5700928e038323bd114acb92b9b9e0139a06a9b0809388180c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0daeead53363aa5700928e038323bd114acb92b9b9e0139a06a9b0809388180c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1884 0daeead53363aa5700928e038323bd114acb92b9b9e0139a06a9b0809388180c.exe 1884 0daeead53363aa5700928e038323bd114acb92b9b9e0139a06a9b0809388180c.exe 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3068 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1884 0daeead53363aa5700928e038323bd114acb92b9b9e0139a06a9b0809388180c.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4628 wrote to memory of 1884 4628 0daeead53363aa5700928e038323bd114acb92b9b9e0139a06a9b0809388180c.exe 85 PID 4628 wrote to memory of 1884 4628 0daeead53363aa5700928e038323bd114acb92b9b9e0139a06a9b0809388180c.exe 85 PID 4628 wrote to memory of 1884 4628 0daeead53363aa5700928e038323bd114acb92b9b9e0139a06a9b0809388180c.exe 85 PID 4628 wrote to memory of 1884 4628 0daeead53363aa5700928e038323bd114acb92b9b9e0139a06a9b0809388180c.exe 85 PID 4628 wrote to memory of 1884 4628 0daeead53363aa5700928e038323bd114acb92b9b9e0139a06a9b0809388180c.exe 85 PID 4628 wrote to memory of 1884 4628 0daeead53363aa5700928e038323bd114acb92b9b9e0139a06a9b0809388180c.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\0daeead53363aa5700928e038323bd114acb92b9b9e0139a06a9b0809388180c.exe"C:\Users\Admin\AppData\Local\Temp\0daeead53363aa5700928e038323bd114acb92b9b9e0139a06a9b0809388180c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\0daeead53363aa5700928e038323bd114acb92b9b9e0139a06a9b0809388180c.exe"C:\Users\Admin\AppData\Local\Temp\0daeead53363aa5700928e038323bd114acb92b9b9e0139a06a9b0809388180c.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1884
-