Analysis
-
max time kernel
150s -
max time network
104s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
26/09/2022, 00:05
Static task
static1
Behavioral task
behavioral1
Sample
9835d1ad8638c10687f5b0b49e9bf385deb77fb583b113f8cd6501cb20c2f468.exe
Resource
win10-20220812-en
9 signatures
150 seconds
General
-
Target
9835d1ad8638c10687f5b0b49e9bf385deb77fb583b113f8cd6501cb20c2f468.exe
-
Size
175KB
-
MD5
f65915666227e62319ff736c8e057462
-
SHA1
5f02e587be5d90fd4cb0ec9fcc807a499f934125
-
SHA256
9835d1ad8638c10687f5b0b49e9bf385deb77fb583b113f8cd6501cb20c2f468
-
SHA512
e779de4856901c9598864cf11364cb0a7fa2d7f0e694eb395970381d0b0a2c649cc8a586069e23d1eaced51e7950b39048989a22ab9fdb4287f1fcc4ea5df421
-
SSDEEP
3072:tG4/bNeafc8z5ms/oyG0bHttnSMQFBNFOkAN5x:RfBoy9bNtnMV
Score
10/10
Malware Config
Signatures
-
Detects Smokeloader packer 5 IoCs
resource yara_rule behavioral1/memory/3516-135-0x00000000006F0000-0x00000000006F9000-memory.dmp family_smokeloader behavioral1/memory/3796-145-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3796-146-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/3796-161-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3796-178-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 2076 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3516 set thread context of 3796 3516 9835d1ad8638c10687f5b0b49e9bf385deb77fb583b113f8cd6501cb20c2f468.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9835d1ad8638c10687f5b0b49e9bf385deb77fb583b113f8cd6501cb20c2f468.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9835d1ad8638c10687f5b0b49e9bf385deb77fb583b113f8cd6501cb20c2f468.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9835d1ad8638c10687f5b0b49e9bf385deb77fb583b113f8cd6501cb20c2f468.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3796 9835d1ad8638c10687f5b0b49e9bf385deb77fb583b113f8cd6501cb20c2f468.exe 3796 9835d1ad8638c10687f5b0b49e9bf385deb77fb583b113f8cd6501cb20c2f468.exe 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found 2076 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2076 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3796 9835d1ad8638c10687f5b0b49e9bf385deb77fb583b113f8cd6501cb20c2f468.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3516 wrote to memory of 3796 3516 9835d1ad8638c10687f5b0b49e9bf385deb77fb583b113f8cd6501cb20c2f468.exe 66 PID 3516 wrote to memory of 3796 3516 9835d1ad8638c10687f5b0b49e9bf385deb77fb583b113f8cd6501cb20c2f468.exe 66 PID 3516 wrote to memory of 3796 3516 9835d1ad8638c10687f5b0b49e9bf385deb77fb583b113f8cd6501cb20c2f468.exe 66 PID 3516 wrote to memory of 3796 3516 9835d1ad8638c10687f5b0b49e9bf385deb77fb583b113f8cd6501cb20c2f468.exe 66 PID 3516 wrote to memory of 3796 3516 9835d1ad8638c10687f5b0b49e9bf385deb77fb583b113f8cd6501cb20c2f468.exe 66 PID 3516 wrote to memory of 3796 3516 9835d1ad8638c10687f5b0b49e9bf385deb77fb583b113f8cd6501cb20c2f468.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\9835d1ad8638c10687f5b0b49e9bf385deb77fb583b113f8cd6501cb20c2f468.exe"C:\Users\Admin\AppData\Local\Temp\9835d1ad8638c10687f5b0b49e9bf385deb77fb583b113f8cd6501cb20c2f468.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\9835d1ad8638c10687f5b0b49e9bf385deb77fb583b113f8cd6501cb20c2f468.exe"C:\Users\Admin\AppData\Local\Temp\9835d1ad8638c10687f5b0b49e9bf385deb77fb583b113f8cd6501cb20c2f468.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3796
-