Analysis

  • max time kernel
    151s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-09-2022 04:29

General

  • Target

    c854b3c9703a9edbbc5ad1ad2bca56f9.exe

  • Size

    129KB

  • MD5

    c854b3c9703a9edbbc5ad1ad2bca56f9

  • SHA1

    c04173761a3765b397031fd697feba36e884c433

  • SHA256

    bf53766eb860140c6914ffb3bb1fa152e709e19b04b932e16dd26c16a8008c17

  • SHA512

    3ddeec9741f366ce5c9e37b590987f609590c62ba6b7f32dcff4aa569eeb8438f25c5fc8ea48540d668f412ced042f00c509192ff7179c3fbb7c36f82d4b2bd2

  • SSDEEP

    3072:lT+LuZT55rms2XBbrdE623LIfVDBLbaaaaaaaCkXQ5B:K3NJbeLIfPLbaaaaaaa3X

Malware Config

Signatures

  • Detects Smokeloader packer ⋅ 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks SCSI registry key(s) ⋅ 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses ⋅ 64 IoCs
  • Suspicious behavior: MapViewOfSection ⋅ 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c854b3c9703a9edbbc5ad1ad2bca56f9.exe
    "C:\Users\Admin\AppData\Local\Temp\c854b3c9703a9edbbc5ad1ad2bca56f9.exe"
    Checks SCSI registry key(s)
    Suspicious behavior: EnumeratesProcesses
    Suspicious behavior: MapViewOfSection
    PID:1904

Network

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

          Execution

            Exfiltration

              Impact

                Initial Access

                  Lateral Movement

                    Persistence

                      Privilege Escalation

                        Replay Monitor

                        00:00 00:00

                        Downloads

                        • memory/1904-54-0x0000000075351000-0x0000000075353000-memory.dmp
                        • memory/1904-55-0x00000000006DB000-0x00000000006EC000-memory.dmp
                        • memory/1904-56-0x0000000000220000-0x0000000000229000-memory.dmp
                        • memory/1904-57-0x0000000000400000-0x000000000057E000-memory.dmp
                        • memory/1904-58-0x0000000000400000-0x000000000057E000-memory.dmp