Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2022, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
9e1cef9f11bdb8587fe39242788911035e8b84d3cd009f3073052da4f15a7c6a.exe
Resource
win10v2004-20220901-en
9 signatures
150 seconds
General
-
Target
9e1cef9f11bdb8587fe39242788911035e8b84d3cd009f3073052da4f15a7c6a.exe
-
Size
142KB
-
MD5
7eb2a82944b57c76d89ef7cdc714c0a2
-
SHA1
9f6085d4eb05577dc9a8ac0d80a5ade568aa7f78
-
SHA256
9e1cef9f11bdb8587fe39242788911035e8b84d3cd009f3073052da4f15a7c6a
-
SHA512
a9b7eca102c488f24e900a54d8c3b0ba6ffb1816f15c38149f5803ef31e3b06542cfc151a42fd970a55d8bd7f3306825efb2c8da08a73a212095126c73a0ae31
-
SSDEEP
3072:ZYlBBrFFMwRlR6fr8H/k26OSN6AwX5FGh03hI3q2:ZYlFFb6dq5Fn2a2
Score
10/10
Malware Config
Signatures
-
Detects Smokeloader packer 4 IoCs
resource yara_rule behavioral1/memory/1784-133-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2308-135-0x00000000006D0000-0x00000000006D9000-memory.dmp family_smokeloader behavioral1/memory/1784-136-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/1784-137-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2308 set thread context of 1784 2308 9e1cef9f11bdb8587fe39242788911035e8b84d3cd009f3073052da4f15a7c6a.exe 83 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9e1cef9f11bdb8587fe39242788911035e8b84d3cd009f3073052da4f15a7c6a.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9e1cef9f11bdb8587fe39242788911035e8b84d3cd009f3073052da4f15a7c6a.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9e1cef9f11bdb8587fe39242788911035e8b84d3cd009f3073052da4f15a7c6a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1784 9e1cef9f11bdb8587fe39242788911035e8b84d3cd009f3073052da4f15a7c6a.exe 1784 9e1cef9f11bdb8587fe39242788911035e8b84d3cd009f3073052da4f15a7c6a.exe 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2416 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1784 9e1cef9f11bdb8587fe39242788911035e8b84d3cd009f3073052da4f15a7c6a.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2416 Process not Found Token: SeCreatePagefilePrivilege 2416 Process not Found Token: SeShutdownPrivilege 2416 Process not Found Token: SeCreatePagefilePrivilege 2416 Process not Found Token: SeShutdownPrivilege 2416 Process not Found Token: SeCreatePagefilePrivilege 2416 Process not Found Token: SeShutdownPrivilege 2416 Process not Found Token: SeCreatePagefilePrivilege 2416 Process not Found Token: SeShutdownPrivilege 2416 Process not Found Token: SeCreatePagefilePrivilege 2416 Process not Found Token: SeShutdownPrivilege 2416 Process not Found Token: SeCreatePagefilePrivilege 2416 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2308 wrote to memory of 1784 2308 9e1cef9f11bdb8587fe39242788911035e8b84d3cd009f3073052da4f15a7c6a.exe 83 PID 2308 wrote to memory of 1784 2308 9e1cef9f11bdb8587fe39242788911035e8b84d3cd009f3073052da4f15a7c6a.exe 83 PID 2308 wrote to memory of 1784 2308 9e1cef9f11bdb8587fe39242788911035e8b84d3cd009f3073052da4f15a7c6a.exe 83 PID 2308 wrote to memory of 1784 2308 9e1cef9f11bdb8587fe39242788911035e8b84d3cd009f3073052da4f15a7c6a.exe 83 PID 2308 wrote to memory of 1784 2308 9e1cef9f11bdb8587fe39242788911035e8b84d3cd009f3073052da4f15a7c6a.exe 83 PID 2308 wrote to memory of 1784 2308 9e1cef9f11bdb8587fe39242788911035e8b84d3cd009f3073052da4f15a7c6a.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e1cef9f11bdb8587fe39242788911035e8b84d3cd009f3073052da4f15a7c6a.exe"C:\Users\Admin\AppData\Local\Temp\9e1cef9f11bdb8587fe39242788911035e8b84d3cd009f3073052da4f15a7c6a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\9e1cef9f11bdb8587fe39242788911035e8b84d3cd009f3073052da4f15a7c6a.exe"C:\Users\Admin\AppData\Local\Temp\9e1cef9f11bdb8587fe39242788911035e8b84d3cd009f3073052da4f15a7c6a.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1784
-