Analysis
-
max time kernel
158s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
1322ea1165926ee5be6b540c55b7ebc4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1322ea1165926ee5be6b540c55b7ebc4.exe
Resource
win10v2004-20220812-en
General
-
Target
1322ea1165926ee5be6b540c55b7ebc4.exe
-
Size
146KB
-
MD5
1322ea1165926ee5be6b540c55b7ebc4
-
SHA1
f0b20c248d5caaf53b53011e568e60f5870d7962
-
SHA256
b8a458c3328da3c876b73ac6b1665c25c137fc7a20979444fb22a80d7132cf0d
-
SHA512
a32acea023e7703ccd38b0c742d688801560e64a37ac8befd63f32166a7bc148634117954f0b8a87956fdd8bf5c44d7127675b6754179cd819e78e6f1037fe7f
-
SSDEEP
3072:90+28yYZfUfwV4ZTyC3bB/ELN+5Q+7Ss3MxO:90wUYVOTy2bBm85Lm5x
Malware Config
Signatures
-
Detects Smokeloader packer 4 IoCs
resource yara_rule behavioral2/memory/2240-134-0x00000000007E0000-0x00000000007E9000-memory.dmp family_smokeloader behavioral2/memory/3716-136-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/3716-137-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/3716-139-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2240 set thread context of 3716 2240 1322ea1165926ee5be6b540c55b7ebc4.exe 81 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1322ea1165926ee5be6b540c55b7ebc4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1322ea1165926ee5be6b540c55b7ebc4.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1322ea1165926ee5be6b540c55b7ebc4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3716 1322ea1165926ee5be6b540c55b7ebc4.exe 3716 1322ea1165926ee5be6b540c55b7ebc4.exe 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2864 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3716 1322ea1165926ee5be6b540c55b7ebc4.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2240 wrote to memory of 3716 2240 1322ea1165926ee5be6b540c55b7ebc4.exe 81 PID 2240 wrote to memory of 3716 2240 1322ea1165926ee5be6b540c55b7ebc4.exe 81 PID 2240 wrote to memory of 3716 2240 1322ea1165926ee5be6b540c55b7ebc4.exe 81 PID 2240 wrote to memory of 3716 2240 1322ea1165926ee5be6b540c55b7ebc4.exe 81 PID 2240 wrote to memory of 3716 2240 1322ea1165926ee5be6b540c55b7ebc4.exe 81 PID 2240 wrote to memory of 3716 2240 1322ea1165926ee5be6b540c55b7ebc4.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\1322ea1165926ee5be6b540c55b7ebc4.exe"C:\Users\Admin\AppData\Local\Temp\1322ea1165926ee5be6b540c55b7ebc4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\1322ea1165926ee5be6b540c55b7ebc4.exe"C:\Users\Admin\AppData\Local\Temp\1322ea1165926ee5be6b540c55b7ebc4.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3716
-