Analysis
-
max time kernel
160s -
max time network
173s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
02/10/2022, 13:49 UTC
Static task
static1
Behavioral task
behavioral1
Sample
d0ed763ee108686d8b358f89a65c45ee932755a3b2ceabb55282e2618e90aba2.exe
Resource
win10-20220812-en
7 signatures
150 seconds
General
-
Target
d0ed763ee108686d8b358f89a65c45ee932755a3b2ceabb55282e2618e90aba2.exe
-
Size
133KB
-
MD5
e874a1fe90698daeb8d0faa9d3b92027
-
SHA1
aa6ce148e834043cf6d2bed8e4e1bfc7e7e8a01c
-
SHA256
d0ed763ee108686d8b358f89a65c45ee932755a3b2ceabb55282e2618e90aba2
-
SHA512
fabbd04a0b85831fa5ed7ff00a30cec4c7b6735e166a8fdc6f81ed3299ee5bfcf51b0efe9e517b296e45ee119c7b7c241a0a9f962631f9a19a4bfdf5e8fdece5
-
SSDEEP
3072:IHzVnRR7Zh7zeOe8uH/096mxoJQEXnLBS:u7DzeKuH89XQB3LB
Score
10/10
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/4056-153-0x00000000006E0000-0x00000000006E9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 2064 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d0ed763ee108686d8b358f89a65c45ee932755a3b2ceabb55282e2618e90aba2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d0ed763ee108686d8b358f89a65c45ee932755a3b2ceabb55282e2618e90aba2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d0ed763ee108686d8b358f89a65c45ee932755a3b2ceabb55282e2618e90aba2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4056 d0ed763ee108686d8b358f89a65c45ee932755a3b2ceabb55282e2618e90aba2.exe 4056 d0ed763ee108686d8b358f89a65c45ee932755a3b2ceabb55282e2618e90aba2.exe 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found 2064 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2064 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4056 d0ed763ee108686d8b358f89a65c45ee932755a3b2ceabb55282e2618e90aba2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0ed763ee108686d8b358f89a65c45ee932755a3b2ceabb55282e2618e90aba2.exe"C:\Users\Admin\AppData\Local\Temp\d0ed763ee108686d8b358f89a65c45ee932755a3b2ceabb55282e2618e90aba2.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4056
Network
-
Remote address:8.8.8.8:53Requestgayworld.atIN AResponsegayworld.atIN A175.119.10.231gayworld.atIN A175.126.109.15gayworld.atIN A37.34.248.24gayworld.atIN A211.119.84.111gayworld.atIN A222.236.49.123gayworld.atIN A195.158.3.162gayworld.atIN A31.166.74.154gayworld.atIN A58.235.189.192gayworld.atIN A222.236.49.124gayworld.atIN A175.120.254.9
-
322 B 7
-
156 B 3
-
156 B 3
-
156 B 3
-
156 B 3
-
156 B 3
-
156 B 3