Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2022 02:08
Static task
static1
Behavioral task
behavioral1
Sample
9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe
Resource
win10v2004-20220812-en
General
-
Target
9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe
-
Size
196KB
-
MD5
fda1158b9abbcba6ca8fec74fecd0d97
-
SHA1
14dd8c135abbb4a3b903088e883902506b1c585e
-
SHA256
9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49
-
SHA512
f384a69627951c3630c9db003144da266ab5332f34baf99b9dcee629b6a997a44212b1c844482614c80706743b53e212a869cec7a189fc9a9f55021fe3c51990
-
SSDEEP
3072:XTto6v2LsgcIVN5FTU/heOkXJr05mLbBYrWaVr/PkkXx:t2LGIHTU/heTUWa
Malware Config
Signatures
-
Detects Smokeloader packer 6 IoCs
Processes:
resource yara_rule behavioral1/memory/868-133-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4328-135-0x0000000000710000-0x0000000000719000-memory.dmp family_smokeloader behavioral1/memory/868-136-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/868-137-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/480-144-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/480-145-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
Processes:
tuttbsvtuttbsvpid process 1340 tuttbsv 480 tuttbsv -
Suspicious use of SetThreadContext 2 IoCs
Processes:
9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exetuttbsvdescription pid process target process PID 4328 set thread context of 868 4328 9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe 9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe PID 1340 set thread context of 480 1340 tuttbsv tuttbsv -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exetuttbsvdescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tuttbsv Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tuttbsv Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tuttbsv Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exepid process 868 9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe 868 9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3052 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exetuttbsvpid process 868 9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe 480 tuttbsv -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exetuttbsvdescription pid process target process PID 4328 wrote to memory of 868 4328 9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe 9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe PID 4328 wrote to memory of 868 4328 9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe 9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe PID 4328 wrote to memory of 868 4328 9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe 9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe PID 4328 wrote to memory of 868 4328 9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe 9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe PID 4328 wrote to memory of 868 4328 9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe 9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe PID 4328 wrote to memory of 868 4328 9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe 9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe PID 1340 wrote to memory of 480 1340 tuttbsv tuttbsv PID 1340 wrote to memory of 480 1340 tuttbsv tuttbsv PID 1340 wrote to memory of 480 1340 tuttbsv tuttbsv PID 1340 wrote to memory of 480 1340 tuttbsv tuttbsv PID 1340 wrote to memory of 480 1340 tuttbsv tuttbsv PID 1340 wrote to memory of 480 1340 tuttbsv tuttbsv
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe"C:\Users\Admin\AppData\Local\Temp\9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe"C:\Users\Admin\AppData\Local\Temp\9e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Roaming\tuttbsvC:\Users\Admin\AppData\Roaming\tuttbsv1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\tuttbsvC:\Users\Admin\AppData\Roaming\tuttbsv2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\tuttbsvFilesize
196KB
MD5fda1158b9abbcba6ca8fec74fecd0d97
SHA114dd8c135abbb4a3b903088e883902506b1c585e
SHA2569e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49
SHA512f384a69627951c3630c9db003144da266ab5332f34baf99b9dcee629b6a997a44212b1c844482614c80706743b53e212a869cec7a189fc9a9f55021fe3c51990
-
C:\Users\Admin\AppData\Roaming\tuttbsvFilesize
196KB
MD5fda1158b9abbcba6ca8fec74fecd0d97
SHA114dd8c135abbb4a3b903088e883902506b1c585e
SHA2569e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49
SHA512f384a69627951c3630c9db003144da266ab5332f34baf99b9dcee629b6a997a44212b1c844482614c80706743b53e212a869cec7a189fc9a9f55021fe3c51990
-
C:\Users\Admin\AppData\Roaming\tuttbsvFilesize
196KB
MD5fda1158b9abbcba6ca8fec74fecd0d97
SHA114dd8c135abbb4a3b903088e883902506b1c585e
SHA2569e65967f6b4441187eb93f33ec2bf04c307ff184fc645748fcbb406d70166d49
SHA512f384a69627951c3630c9db003144da266ab5332f34baf99b9dcee629b6a997a44212b1c844482614c80706743b53e212a869cec7a189fc9a9f55021fe3c51990
-
memory/480-140-0x0000000000000000-mapping.dmp
-
memory/480-144-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/480-145-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/868-136-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/868-137-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/868-133-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/868-132-0x0000000000000000-mapping.dmp
-
memory/1340-143-0x0000000000749000-0x0000000000759000-memory.dmpFilesize
64KB
-
memory/4328-135-0x0000000000710000-0x0000000000719000-memory.dmpFilesize
36KB
-
memory/4328-134-0x0000000000808000-0x0000000000819000-memory.dmpFilesize
68KB