Analysis
-
max time kernel
150s -
max time network
103s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
22/09/2022, 23:57
Static task
static1
Behavioral task
behavioral1
Sample
5efc24b4685adc56e71dce962bfe8430a3ae226987e95421a011a9503549400d.exe
Resource
win10-20220812-en
9 signatures
150 seconds
General
-
Target
5efc24b4685adc56e71dce962bfe8430a3ae226987e95421a011a9503549400d.exe
-
Size
280KB
-
MD5
d4a1d6fdbd12881069390066d6832bfd
-
SHA1
06b83748c33ac3e3ad95c73d0ca3e6bcef91d8af
-
SHA256
5efc24b4685adc56e71dce962bfe8430a3ae226987e95421a011a9503549400d
-
SHA512
6b446d18662cc5f409f8016e939ef4b1cab3233a37238effe5520ed1bad4654c06dc1d72cd9dea68118a37f48a13f655aaab4a47e51d5d711133dcc6ec1fde66
-
SSDEEP
6144:17vuTCP6LJ3wHtSWtWaRXKUlxK0CwABL5/wigavwVf:17muil3wHtSWUCXVTBABr
Score
10/10
Malware Config
Signatures
-
Detects Smokeloader packer 5 IoCs
resource yara_rule behavioral1/memory/4612-145-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4612-146-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/2960-149-0x00000000001D0000-0x00000000001D9000-memory.dmp family_smokeloader behavioral1/memory/4612-162-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4612-179-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 2604 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2960 set thread context of 4612 2960 5efc24b4685adc56e71dce962bfe8430a3ae226987e95421a011a9503549400d.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5efc24b4685adc56e71dce962bfe8430a3ae226987e95421a011a9503549400d.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5efc24b4685adc56e71dce962bfe8430a3ae226987e95421a011a9503549400d.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5efc24b4685adc56e71dce962bfe8430a3ae226987e95421a011a9503549400d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4612 5efc24b4685adc56e71dce962bfe8430a3ae226987e95421a011a9503549400d.exe 4612 5efc24b4685adc56e71dce962bfe8430a3ae226987e95421a011a9503549400d.exe 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2604 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4612 5efc24b4685adc56e71dce962bfe8430a3ae226987e95421a011a9503549400d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2960 wrote to memory of 4612 2960 5efc24b4685adc56e71dce962bfe8430a3ae226987e95421a011a9503549400d.exe 66 PID 2960 wrote to memory of 4612 2960 5efc24b4685adc56e71dce962bfe8430a3ae226987e95421a011a9503549400d.exe 66 PID 2960 wrote to memory of 4612 2960 5efc24b4685adc56e71dce962bfe8430a3ae226987e95421a011a9503549400d.exe 66 PID 2960 wrote to memory of 4612 2960 5efc24b4685adc56e71dce962bfe8430a3ae226987e95421a011a9503549400d.exe 66 PID 2960 wrote to memory of 4612 2960 5efc24b4685adc56e71dce962bfe8430a3ae226987e95421a011a9503549400d.exe 66 PID 2960 wrote to memory of 4612 2960 5efc24b4685adc56e71dce962bfe8430a3ae226987e95421a011a9503549400d.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\5efc24b4685adc56e71dce962bfe8430a3ae226987e95421a011a9503549400d.exe"C:\Users\Admin\AppData\Local\Temp\5efc24b4685adc56e71dce962bfe8430a3ae226987e95421a011a9503549400d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\5efc24b4685adc56e71dce962bfe8430a3ae226987e95421a011a9503549400d.exe"C:\Users\Admin\AppData\Local\Temp\5efc24b4685adc56e71dce962bfe8430a3ae226987e95421a011a9503549400d.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4612
-