Analysis
-
max time kernel
151s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26/09/2022, 23:49
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
129KB
-
MD5
4ca202b9f0ab111160d8f76828b3c846
-
SHA1
9de7f99dbbc1e5884c1c19b4dc4fc5c7547c14c9
-
SHA256
51d731f0dd3f253a5bff6fe46b92fcdc576b3eb2e12fb2cd213f18db5fa3d850
-
SHA512
2391f9c2ace749183dbee6abc43c9380226fd0f80d92933957f0382ea659670510be4a013f3284407950000e07a930802bc38384d86f357774934d7360eaebd6
-
SSDEEP
3072:BF2RgtTI5wZ8UvYFAujPq8mCHr5/gWP/nciex897LEu5B:BtZ8Z7LplpP/Bex8C
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral2/memory/4676-133-0x00000000006D0000-0x00000000006D9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 1 IoCs
pid Process 3800 icstjac -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI icstjac Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI icstjac Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI icstjac -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4676 file.exe 4676 file.exe 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found 724 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 724 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4676 file.exe 3800 icstjac
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4676
-
C:\Users\Admin\AppData\Roaming\icstjacC:\Users\Admin\AppData\Roaming\icstjac1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3800
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129KB
MD54ca202b9f0ab111160d8f76828b3c846
SHA19de7f99dbbc1e5884c1c19b4dc4fc5c7547c14c9
SHA25651d731f0dd3f253a5bff6fe46b92fcdc576b3eb2e12fb2cd213f18db5fa3d850
SHA5122391f9c2ace749183dbee6abc43c9380226fd0f80d92933957f0382ea659670510be4a013f3284407950000e07a930802bc38384d86f357774934d7360eaebd6
-
Filesize
129KB
MD54ca202b9f0ab111160d8f76828b3c846
SHA19de7f99dbbc1e5884c1c19b4dc4fc5c7547c14c9
SHA25651d731f0dd3f253a5bff6fe46b92fcdc576b3eb2e12fb2cd213f18db5fa3d850
SHA5122391f9c2ace749183dbee6abc43c9380226fd0f80d92933957f0382ea659670510be4a013f3284407950000e07a930802bc38384d86f357774934d7360eaebd6