Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
27-09-2022 05:57
Static task
static1
Behavioral task
behavioral1
Sample
10c0266a2cedeed9e73873553be0b50205972f7a648f3b0e4464d1f953ce55e7.exe
Resource
win10-20220812-en
General
-
Target
10c0266a2cedeed9e73873553be0b50205972f7a648f3b0e4464d1f953ce55e7.exe
-
Size
319KB
-
MD5
3cdc47028c77ab43d903e4d0f7d2c58d
-
SHA1
7aaa22d4bef011a3ffdde62f5f45f56f572bb093
-
SHA256
10c0266a2cedeed9e73873553be0b50205972f7a648f3b0e4464d1f953ce55e7
-
SHA512
4474489579deac15b4cf50fb0c58b378d32643837eacf57d3011f03b49bdd40f8a6d696a8bd40e113ee3952c3747534cdd54e758614a361e9bc0e709bee9eec8
-
SSDEEP
3072:UTXQ8DoibNF5QDsVwrdq5htzjMUW6NOYSlDrtx5UY0KInAXtM/h3BsxkgaBChU/S:ULQdoVjtz/1teHtvf0gXtnigabwVfx
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/2336-153-0x00000000001E0000-0x00000000001E9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 1 IoCs
pid Process 3712 jjbgdtw -
Deletes itself 1 IoCs
pid Process 3024 Process not Found -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 10c0266a2cedeed9e73873553be0b50205972f7a648f3b0e4464d1f953ce55e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jjbgdtw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jjbgdtw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jjbgdtw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 10c0266a2cedeed9e73873553be0b50205972f7a648f3b0e4464d1f953ce55e7.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 10c0266a2cedeed9e73873553be0b50205972f7a648f3b0e4464d1f953ce55e7.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2336 10c0266a2cedeed9e73873553be0b50205972f7a648f3b0e4464d1f953ce55e7.exe 2336 10c0266a2cedeed9e73873553be0b50205972f7a648f3b0e4464d1f953ce55e7.exe 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3024 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2336 10c0266a2cedeed9e73873553be0b50205972f7a648f3b0e4464d1f953ce55e7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10c0266a2cedeed9e73873553be0b50205972f7a648f3b0e4464d1f953ce55e7.exe"C:\Users\Admin\AppData\Local\Temp\10c0266a2cedeed9e73873553be0b50205972f7a648f3b0e4464d1f953ce55e7.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2336
-
C:\Users\Admin\AppData\Roaming\jjbgdtwC:\Users\Admin\AppData\Roaming\jjbgdtw1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:3712
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
319KB
MD53cdc47028c77ab43d903e4d0f7d2c58d
SHA17aaa22d4bef011a3ffdde62f5f45f56f572bb093
SHA25610c0266a2cedeed9e73873553be0b50205972f7a648f3b0e4464d1f953ce55e7
SHA5124474489579deac15b4cf50fb0c58b378d32643837eacf57d3011f03b49bdd40f8a6d696a8bd40e113ee3952c3747534cdd54e758614a361e9bc0e709bee9eec8
-
Filesize
319KB
MD53cdc47028c77ab43d903e4d0f7d2c58d
SHA17aaa22d4bef011a3ffdde62f5f45f56f572bb093
SHA25610c0266a2cedeed9e73873553be0b50205972f7a648f3b0e4464d1f953ce55e7
SHA5124474489579deac15b4cf50fb0c58b378d32643837eacf57d3011f03b49bdd40f8a6d696a8bd40e113ee3952c3747534cdd54e758614a361e9bc0e709bee9eec8