Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24/09/2022, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220901-en
General
-
Target
file.exe
-
Size
197KB
-
MD5
b062af6e94c55dd5e0a0cc424758f81d
-
SHA1
342fa3ece76e43b90ccf75693eafac737bd6706e
-
SHA256
86002738fa3799993d1093c90c7a245dae50cb37044e8fd72877a7220c46ea2f
-
SHA512
110ef458e9cb6d2a10d83729a4ee2b51ebe22aae3bfb736f2f946f79ad52c76be26df8a14d0e2f84657fa159b982fcf05cde40d5f698ff865196c9aadd91a1c8
-
SSDEEP
3072:55ysULf4ZZ+A579Ik/yIiIxda5l5m8fBitS0m/PkkXx:OLCZZtniHmR
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral2/memory/644-133-0x0000000000650000-0x0000000000659000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 1 IoCs
pid Process 4488 huidijd -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI huidijd Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI huidijd Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI huidijd Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 644 file.exe 644 file.exe 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2724 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 644 file.exe 4488 huidijd -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2724 Process not Found 2724 Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:644
-
C:\Users\Admin\AppData\Roaming\huidijdC:\Users\Admin\AppData\Roaming\huidijd1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4488
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD5b062af6e94c55dd5e0a0cc424758f81d
SHA1342fa3ece76e43b90ccf75693eafac737bd6706e
SHA25686002738fa3799993d1093c90c7a245dae50cb37044e8fd72877a7220c46ea2f
SHA512110ef458e9cb6d2a10d83729a4ee2b51ebe22aae3bfb736f2f946f79ad52c76be26df8a14d0e2f84657fa159b982fcf05cde40d5f698ff865196c9aadd91a1c8
-
Filesize
197KB
MD5b062af6e94c55dd5e0a0cc424758f81d
SHA1342fa3ece76e43b90ccf75693eafac737bd6706e
SHA25686002738fa3799993d1093c90c7a245dae50cb37044e8fd72877a7220c46ea2f
SHA512110ef458e9cb6d2a10d83729a4ee2b51ebe22aae3bfb736f2f946f79ad52c76be26df8a14d0e2f84657fa159b982fcf05cde40d5f698ff865196c9aadd91a1c8