Analysis
-
max time kernel
150s -
max time network
75s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
29-09-2022 09:25
Static task
static1
Behavioral task
behavioral1
Sample
f28a604bee55882d1f62a99c0cbdcb58943e9e4682dd85c78f9c2256566f70f5.exe
Resource
win10-20220812-en
General
-
Target
f28a604bee55882d1f62a99c0cbdcb58943e9e4682dd85c78f9c2256566f70f5.exe
-
Size
292KB
-
MD5
f0898df28bae43577f44131db4fc2eb4
-
SHA1
3d51fde65e5ad3201bcee9f170e679b8903aea07
-
SHA256
f28a604bee55882d1f62a99c0cbdcb58943e9e4682dd85c78f9c2256566f70f5
-
SHA512
e2bed745bb87afb315f653161aa665f7c0871717da833f164bb72f6113a9d948fb02adb2b2c7a114cf7a5e218e818a8103a27028a4374de35d3ebcfb4277b87f
-
SSDEEP
3072:JXhHyJTgN7umqow5V35QX6ey8zwnjz5KLhBQV3Y82F0nFV1AcoqS+0K4M/h3JpZz:thOTcqow58X6eCzk27r/1nj0RwwVfgt
Malware Config
Signatures
-
Detects Smokeloader packer 4 IoCs
resource yara_rule behavioral1/memory/3852-147-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3852-148-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/3852-170-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3852-180-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 2336 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2672 set thread context of 3852 2672 f28a604bee55882d1f62a99c0cbdcb58943e9e4682dd85c78f9c2256566f70f5.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f28a604bee55882d1f62a99c0cbdcb58943e9e4682dd85c78f9c2256566f70f5.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f28a604bee55882d1f62a99c0cbdcb58943e9e4682dd85c78f9c2256566f70f5.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f28a604bee55882d1f62a99c0cbdcb58943e9e4682dd85c78f9c2256566f70f5.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3852 f28a604bee55882d1f62a99c0cbdcb58943e9e4682dd85c78f9c2256566f70f5.exe 3852 f28a604bee55882d1f62a99c0cbdcb58943e9e4682dd85c78f9c2256566f70f5.exe 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2336 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3852 f28a604bee55882d1f62a99c0cbdcb58943e9e4682dd85c78f9c2256566f70f5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2672 wrote to memory of 3852 2672 f28a604bee55882d1f62a99c0cbdcb58943e9e4682dd85c78f9c2256566f70f5.exe 66 PID 2672 wrote to memory of 3852 2672 f28a604bee55882d1f62a99c0cbdcb58943e9e4682dd85c78f9c2256566f70f5.exe 66 PID 2672 wrote to memory of 3852 2672 f28a604bee55882d1f62a99c0cbdcb58943e9e4682dd85c78f9c2256566f70f5.exe 66 PID 2672 wrote to memory of 3852 2672 f28a604bee55882d1f62a99c0cbdcb58943e9e4682dd85c78f9c2256566f70f5.exe 66 PID 2672 wrote to memory of 3852 2672 f28a604bee55882d1f62a99c0cbdcb58943e9e4682dd85c78f9c2256566f70f5.exe 66 PID 2672 wrote to memory of 3852 2672 f28a604bee55882d1f62a99c0cbdcb58943e9e4682dd85c78f9c2256566f70f5.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\f28a604bee55882d1f62a99c0cbdcb58943e9e4682dd85c78f9c2256566f70f5.exe"C:\Users\Admin\AppData\Local\Temp\f28a604bee55882d1f62a99c0cbdcb58943e9e4682dd85c78f9c2256566f70f5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\f28a604bee55882d1f62a99c0cbdcb58943e9e4682dd85c78f9c2256566f70f5.exe"C:\Users\Admin\AppData\Local\Temp\f28a604bee55882d1f62a99c0cbdcb58943e9e4682dd85c78f9c2256566f70f5.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3852
-