Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
04/10/2022, 23:58
Static task
static1
Behavioral task
behavioral1
Sample
08c809ed20f14ce51e1b00217f3cc24d876942f40e34c679cd0e6da55dacb52a.exe
Resource
win10-20220812-en
General
-
Target
08c809ed20f14ce51e1b00217f3cc24d876942f40e34c679cd0e6da55dacb52a.exe
-
Size
265KB
-
MD5
1cb4d0e451b51966afbebd0fa56d3c57
-
SHA1
499f395fefc03db77e4028982fdad0299ede7d0e
-
SHA256
08c809ed20f14ce51e1b00217f3cc24d876942f40e34c679cd0e6da55dacb52a
-
SHA512
626c7a40ca42869d4a02614f54eda7db882c7a1661883cdc73bbe99417e15b8ffe03a4af1d665a279a2a8ac0e4d2387692f05f30ad8208b40afc40f17af0b4a3
-
SSDEEP
3072:TXhuDKXNLQwKL5AFdSU5ELay+vXmgYmS/3ETRuAS1WVb4Wrxpzbgqru9eLxrhpZO:L8mLaAFuDxQS/30a1c4uzbgwusllwVf
Malware Config
Signatures
-
Detects Smokeloader packer 7 IoCs
resource yara_rule behavioral1/memory/4992-144-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4992-145-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/4992-159-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4992-176-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2852-208-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/5108-215-0x00000000004B0000-0x00000000004B9000-memory.dmp family_smokeloader behavioral1/memory/2852-241-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 5108 csugrww 2852 csugrww -
Deletes itself 1 IoCs
pid Process 2444 Process not Found -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2684 set thread context of 4992 2684 08c809ed20f14ce51e1b00217f3cc24d876942f40e34c679cd0e6da55dacb52a.exe 66 PID 5108 set thread context of 2852 5108 csugrww 68 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 08c809ed20f14ce51e1b00217f3cc24d876942f40e34c679cd0e6da55dacb52a.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 08c809ed20f14ce51e1b00217f3cc24d876942f40e34c679cd0e6da55dacb52a.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 08c809ed20f14ce51e1b00217f3cc24d876942f40e34c679cd0e6da55dacb52a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI csugrww Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI csugrww Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI csugrww -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4992 08c809ed20f14ce51e1b00217f3cc24d876942f40e34c679cd0e6da55dacb52a.exe 4992 08c809ed20f14ce51e1b00217f3cc24d876942f40e34c679cd0e6da55dacb52a.exe 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found 2444 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2444 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4992 08c809ed20f14ce51e1b00217f3cc24d876942f40e34c679cd0e6da55dacb52a.exe 2852 csugrww -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2444 Process not Found Token: SeCreatePagefilePrivilege 2444 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2684 wrote to memory of 4992 2684 08c809ed20f14ce51e1b00217f3cc24d876942f40e34c679cd0e6da55dacb52a.exe 66 PID 2684 wrote to memory of 4992 2684 08c809ed20f14ce51e1b00217f3cc24d876942f40e34c679cd0e6da55dacb52a.exe 66 PID 2684 wrote to memory of 4992 2684 08c809ed20f14ce51e1b00217f3cc24d876942f40e34c679cd0e6da55dacb52a.exe 66 PID 2684 wrote to memory of 4992 2684 08c809ed20f14ce51e1b00217f3cc24d876942f40e34c679cd0e6da55dacb52a.exe 66 PID 2684 wrote to memory of 4992 2684 08c809ed20f14ce51e1b00217f3cc24d876942f40e34c679cd0e6da55dacb52a.exe 66 PID 2684 wrote to memory of 4992 2684 08c809ed20f14ce51e1b00217f3cc24d876942f40e34c679cd0e6da55dacb52a.exe 66 PID 5108 wrote to memory of 2852 5108 csugrww 68 PID 5108 wrote to memory of 2852 5108 csugrww 68 PID 5108 wrote to memory of 2852 5108 csugrww 68 PID 5108 wrote to memory of 2852 5108 csugrww 68 PID 5108 wrote to memory of 2852 5108 csugrww 68 PID 5108 wrote to memory of 2852 5108 csugrww 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\08c809ed20f14ce51e1b00217f3cc24d876942f40e34c679cd0e6da55dacb52a.exe"C:\Users\Admin\AppData\Local\Temp\08c809ed20f14ce51e1b00217f3cc24d876942f40e34c679cd0e6da55dacb52a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\08c809ed20f14ce51e1b00217f3cc24d876942f40e34c679cd0e6da55dacb52a.exe"C:\Users\Admin\AppData\Local\Temp\08c809ed20f14ce51e1b00217f3cc24d876942f40e34c679cd0e6da55dacb52a.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4992
-
-
C:\Users\Admin\AppData\Roaming\csugrwwC:\Users\Admin\AppData\Roaming\csugrww1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Roaming\csugrwwC:\Users\Admin\AppData\Roaming\csugrww2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2852
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265KB
MD51cb4d0e451b51966afbebd0fa56d3c57
SHA1499f395fefc03db77e4028982fdad0299ede7d0e
SHA25608c809ed20f14ce51e1b00217f3cc24d876942f40e34c679cd0e6da55dacb52a
SHA512626c7a40ca42869d4a02614f54eda7db882c7a1661883cdc73bbe99417e15b8ffe03a4af1d665a279a2a8ac0e4d2387692f05f30ad8208b40afc40f17af0b4a3
-
Filesize
265KB
MD51cb4d0e451b51966afbebd0fa56d3c57
SHA1499f395fefc03db77e4028982fdad0299ede7d0e
SHA25608c809ed20f14ce51e1b00217f3cc24d876942f40e34c679cd0e6da55dacb52a
SHA512626c7a40ca42869d4a02614f54eda7db882c7a1661883cdc73bbe99417e15b8ffe03a4af1d665a279a2a8ac0e4d2387692f05f30ad8208b40afc40f17af0b4a3
-
Filesize
265KB
MD51cb4d0e451b51966afbebd0fa56d3c57
SHA1499f395fefc03db77e4028982fdad0299ede7d0e
SHA25608c809ed20f14ce51e1b00217f3cc24d876942f40e34c679cd0e6da55dacb52a
SHA512626c7a40ca42869d4a02614f54eda7db882c7a1661883cdc73bbe99417e15b8ffe03a4af1d665a279a2a8ac0e4d2387692f05f30ad8208b40afc40f17af0b4a3