Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2022, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
284KB
-
MD5
843002e5912c43e3c12ba581bb36392e
-
SHA1
0fa3cb130e264ee4d875ae10470724671499956d
-
SHA256
40adc6e92ca2f30ce02d7a45181bbda2bd30155d1496c12e92860fbf72572e12
-
SHA512
a90123227356bc6cd02489e480e0a0c5be06607aa3c5091e1f8ca4be3f9154d7345a214d3f8de5a641207dd0b2436f696e9c34b57c08201be9afce24f968baa0
-
SSDEEP
6144:z+9BctZBeshJmsOTkuIfuzbgwuO0WfwVfg+L:z5tveshJmNTkuIunnwI+
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral2/memory/3448-133-0x00000000004D0000-0x00000000004D9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 216 350A.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 350A.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3448 file.exe 3448 file.exe 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found 512 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 512 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3448 file.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 512 wrote to memory of 216 512 Process not Found 89 PID 512 wrote to memory of 216 512 Process not Found 89 PID 512 wrote to memory of 216 512 Process not Found 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3448
-
C:\Users\Admin\AppData\Local\Temp\350A.exeC:\Users\Admin\AppData\Local\Temp\350A.exe1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
606KB
MD5bbcb39371a9c50d38dcca013773bb119
SHA1595bd43fbe68c2628d7cb335195d1d52c9256d83
SHA2562a189bee6efa3494d238444e14e1a709cef9ad3b32093518a5bb06d7196516e0
SHA512314c4318a818eebbf2bfda93d2c199d2a7a3538cc32b967ef5edfe88d7dd3b7575da8a4814c0cb3d3554c077e56685f32db3d4ce838239b9ecf3f67ec1a4ae13
-
Filesize
606KB
MD5bbcb39371a9c50d38dcca013773bb119
SHA1595bd43fbe68c2628d7cb335195d1d52c9256d83
SHA2562a189bee6efa3494d238444e14e1a709cef9ad3b32093518a5bb06d7196516e0
SHA512314c4318a818eebbf2bfda93d2c199d2a7a3538cc32b967ef5edfe88d7dd3b7575da8a4814c0cb3d3554c077e56685f32db3d4ce838239b9ecf3f67ec1a4ae13