Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
29-09-2022 01:23
Static task
static1
Behavioral task
behavioral1
Sample
5280656180e5d2de75a102392d232e5543070d65b0e649551139dec65b362455.exe
Resource
win10-20220812-en
General
-
Target
5280656180e5d2de75a102392d232e5543070d65b0e649551139dec65b362455.exe
-
Size
271KB
-
MD5
1c1b039422b43c467f6afddbaf576d83
-
SHA1
36c55bae081563bddb982de6b749a7f7fe3591fe
-
SHA256
5280656180e5d2de75a102392d232e5543070d65b0e649551139dec65b362455
-
SHA512
4a1ba46a316f9c77551de6ab379553393b5286c63661a5fe9e0d364868d3a9f92dbef66df59f433e5d9a9225857192a60fc37e2f71d9b6943474596757b9129c
-
SSDEEP
3072:OXhZudGeGQJ8M+91q5HlWRAPulCDc4p0qdVCmsxkgaBChUpZa9uD6VdyhkgRv4eR:WT5E8f9Cq8cCDcEOTiga3wVfg
Malware Config
Signatures
-
Detects Smokeloader packer 5 IoCs
resource yara_rule behavioral1/memory/2764-144-0x00000000004A0000-0x00000000004A9000-memory.dmp family_smokeloader behavioral1/memory/4544-146-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4544-147-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/4544-164-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4544-178-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3044 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2764 set thread context of 4544 2764 5280656180e5d2de75a102392d232e5543070d65b0e649551139dec65b362455.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5280656180e5d2de75a102392d232e5543070d65b0e649551139dec65b362455.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5280656180e5d2de75a102392d232e5543070d65b0e649551139dec65b362455.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5280656180e5d2de75a102392d232e5543070d65b0e649551139dec65b362455.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4544 5280656180e5d2de75a102392d232e5543070d65b0e649551139dec65b362455.exe 4544 5280656180e5d2de75a102392d232e5543070d65b0e649551139dec65b362455.exe 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3044 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4544 5280656180e5d2de75a102392d232e5543070d65b0e649551139dec65b362455.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2764 wrote to memory of 4544 2764 5280656180e5d2de75a102392d232e5543070d65b0e649551139dec65b362455.exe 66 PID 2764 wrote to memory of 4544 2764 5280656180e5d2de75a102392d232e5543070d65b0e649551139dec65b362455.exe 66 PID 2764 wrote to memory of 4544 2764 5280656180e5d2de75a102392d232e5543070d65b0e649551139dec65b362455.exe 66 PID 2764 wrote to memory of 4544 2764 5280656180e5d2de75a102392d232e5543070d65b0e649551139dec65b362455.exe 66 PID 2764 wrote to memory of 4544 2764 5280656180e5d2de75a102392d232e5543070d65b0e649551139dec65b362455.exe 66 PID 2764 wrote to memory of 4544 2764 5280656180e5d2de75a102392d232e5543070d65b0e649551139dec65b362455.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\5280656180e5d2de75a102392d232e5543070d65b0e649551139dec65b362455.exe"C:\Users\Admin\AppData\Local\Temp\5280656180e5d2de75a102392d232e5543070d65b0e649551139dec65b362455.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\5280656180e5d2de75a102392d232e5543070d65b0e649551139dec65b362455.exe"C:\Users\Admin\AppData\Local\Temp\5280656180e5d2de75a102392d232e5543070d65b0e649551139dec65b362455.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4544
-