Analysis
-
max time kernel
150s -
max time network
72s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
01-10-2022 12:57
Static task
static1
Behavioral task
behavioral1
Sample
f93ba32f22e747dec19ebdf57fc8b1f775feca04f70a69d0660b905956b246f4.exe
Resource
win10-20220812-en
General
-
Target
f93ba32f22e747dec19ebdf57fc8b1f775feca04f70a69d0660b905956b246f4.exe
-
Size
144KB
-
MD5
3508ff32f2a887c1e452f01d11e1646b
-
SHA1
1b57b9527a6e7f76d4a532f98a0bf6cfa738e29f
-
SHA256
f93ba32f22e747dec19ebdf57fc8b1f775feca04f70a69d0660b905956b246f4
-
SHA512
0b64825535c0379179e00fe3fcb2ebb482af5fb182557aaffa4c3a1133bb7b41460a4747e6d20a757755b20f6f2c58f2c128e3d1ae00c09fa78c30c6f81bfc36
-
SSDEEP
3072:h6rNR6+ZRRuQ4ed/ndZm0+YDVvM1jpvDhGuvF:QR6SR/y70v4pDNvF
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/3176-143-0x0000000000690000-0x0000000000699000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 1 IoCs
pid Process 1636 sjestih -
Deletes itself 1 IoCs
pid Process 2996 Process not Found -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f93ba32f22e747dec19ebdf57fc8b1f775feca04f70a69d0660b905956b246f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sjestih Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sjestih Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sjestih Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f93ba32f22e747dec19ebdf57fc8b1f775feca04f70a69d0660b905956b246f4.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f93ba32f22e747dec19ebdf57fc8b1f775feca04f70a69d0660b905956b246f4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3176 f93ba32f22e747dec19ebdf57fc8b1f775feca04f70a69d0660b905956b246f4.exe 3176 f93ba32f22e747dec19ebdf57fc8b1f775feca04f70a69d0660b905956b246f4.exe 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found 2996 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2996 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3176 f93ba32f22e747dec19ebdf57fc8b1f775feca04f70a69d0660b905956b246f4.exe 1636 sjestih
Processes
-
C:\Users\Admin\AppData\Local\Temp\f93ba32f22e747dec19ebdf57fc8b1f775feca04f70a69d0660b905956b246f4.exe"C:\Users\Admin\AppData\Local\Temp\f93ba32f22e747dec19ebdf57fc8b1f775feca04f70a69d0660b905956b246f4.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3176
-
C:\Users\Admin\AppData\Roaming\sjestihC:\Users\Admin\AppData\Roaming\sjestih1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1636
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD53508ff32f2a887c1e452f01d11e1646b
SHA11b57b9527a6e7f76d4a532f98a0bf6cfa738e29f
SHA256f93ba32f22e747dec19ebdf57fc8b1f775feca04f70a69d0660b905956b246f4
SHA5120b64825535c0379179e00fe3fcb2ebb482af5fb182557aaffa4c3a1133bb7b41460a4747e6d20a757755b20f6f2c58f2c128e3d1ae00c09fa78c30c6f81bfc36
-
Filesize
144KB
MD53508ff32f2a887c1e452f01d11e1646b
SHA11b57b9527a6e7f76d4a532f98a0bf6cfa738e29f
SHA256f93ba32f22e747dec19ebdf57fc8b1f775feca04f70a69d0660b905956b246f4
SHA5120b64825535c0379179e00fe3fcb2ebb482af5fb182557aaffa4c3a1133bb7b41460a4747e6d20a757755b20f6f2c58f2c128e3d1ae00c09fa78c30c6f81bfc36