Analysis
-
max time kernel
155s -
max time network
63s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
04-10-2022 23:38
Static task
static1
Behavioral task
behavioral1
Sample
5b8b64c570e91d014d876d61c15a793eb46fe42c50f037113437c62aaea015e8.exe
Resource
win10-20220812-en
General
-
Target
5b8b64c570e91d014d876d61c15a793eb46fe42c50f037113437c62aaea015e8.exe
-
Size
265KB
-
MD5
e704a20dd55f35e12e7aad186f1f3bc1
-
SHA1
505f5f855bc92097413ccbf44b605287e8ca5aa7
-
SHA256
5b8b64c570e91d014d876d61c15a793eb46fe42c50f037113437c62aaea015e8
-
SHA512
57d0ba5688ebf831ff5ca984dadd765c8d3bba2f0670c2d3853f5ff41c667a7d515c9ab4acc6d4e7c4eb0efdafe76d3681681e1a7c8e25c56ea0dedd4a8dee26
-
SSDEEP
6144:8fWLwCwTJKBUf2sOG2IuzbgwuJz8GwVf:8uU3TYBUes/unnc
Malware Config
Signatures
-
Detects Smokeloader packer 8 IoCs
resource yara_rule behavioral1/memory/2968-151-0x00000000004E0000-0x00000000004E9000-memory.dmp family_smokeloader behavioral1/memory/5044-148-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/5044-147-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/5044-170-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/5044-180-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2700-213-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/2700-244-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2700-245-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 4184 fsdrdiw 2700 fsdrdiw -
Deletes itself 1 IoCs
pid Process 2604 Process not Found -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2968 set thread context of 5044 2968 5b8b64c570e91d014d876d61c15a793eb46fe42c50f037113437c62aaea015e8.exe 66 PID 4184 set thread context of 2700 4184 fsdrdiw 68 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5b8b64c570e91d014d876d61c15a793eb46fe42c50f037113437c62aaea015e8.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5b8b64c570e91d014d876d61c15a793eb46fe42c50f037113437c62aaea015e8.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5b8b64c570e91d014d876d61c15a793eb46fe42c50f037113437c62aaea015e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fsdrdiw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fsdrdiw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fsdrdiw -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5044 5b8b64c570e91d014d876d61c15a793eb46fe42c50f037113437c62aaea015e8.exe 5044 5b8b64c570e91d014d876d61c15a793eb46fe42c50f037113437c62aaea015e8.exe 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found 2604 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2604 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 5044 5b8b64c570e91d014d876d61c15a793eb46fe42c50f037113437c62aaea015e8.exe 2700 fsdrdiw -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2604 Process not Found Token: SeCreatePagefilePrivilege 2604 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2968 wrote to memory of 5044 2968 5b8b64c570e91d014d876d61c15a793eb46fe42c50f037113437c62aaea015e8.exe 66 PID 2968 wrote to memory of 5044 2968 5b8b64c570e91d014d876d61c15a793eb46fe42c50f037113437c62aaea015e8.exe 66 PID 2968 wrote to memory of 5044 2968 5b8b64c570e91d014d876d61c15a793eb46fe42c50f037113437c62aaea015e8.exe 66 PID 2968 wrote to memory of 5044 2968 5b8b64c570e91d014d876d61c15a793eb46fe42c50f037113437c62aaea015e8.exe 66 PID 2968 wrote to memory of 5044 2968 5b8b64c570e91d014d876d61c15a793eb46fe42c50f037113437c62aaea015e8.exe 66 PID 2968 wrote to memory of 5044 2968 5b8b64c570e91d014d876d61c15a793eb46fe42c50f037113437c62aaea015e8.exe 66 PID 4184 wrote to memory of 2700 4184 fsdrdiw 68 PID 4184 wrote to memory of 2700 4184 fsdrdiw 68 PID 4184 wrote to memory of 2700 4184 fsdrdiw 68 PID 4184 wrote to memory of 2700 4184 fsdrdiw 68 PID 4184 wrote to memory of 2700 4184 fsdrdiw 68 PID 4184 wrote to memory of 2700 4184 fsdrdiw 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b8b64c570e91d014d876d61c15a793eb46fe42c50f037113437c62aaea015e8.exe"C:\Users\Admin\AppData\Local\Temp\5b8b64c570e91d014d876d61c15a793eb46fe42c50f037113437c62aaea015e8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\5b8b64c570e91d014d876d61c15a793eb46fe42c50f037113437c62aaea015e8.exe"C:\Users\Admin\AppData\Local\Temp\5b8b64c570e91d014d876d61c15a793eb46fe42c50f037113437c62aaea015e8.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5044
-
-
C:\Users\Admin\AppData\Roaming\fsdrdiwC:\Users\Admin\AppData\Roaming\fsdrdiw1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Roaming\fsdrdiwC:\Users\Admin\AppData\Roaming\fsdrdiw2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2700
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265KB
MD5e704a20dd55f35e12e7aad186f1f3bc1
SHA1505f5f855bc92097413ccbf44b605287e8ca5aa7
SHA2565b8b64c570e91d014d876d61c15a793eb46fe42c50f037113437c62aaea015e8
SHA51257d0ba5688ebf831ff5ca984dadd765c8d3bba2f0670c2d3853f5ff41c667a7d515c9ab4acc6d4e7c4eb0efdafe76d3681681e1a7c8e25c56ea0dedd4a8dee26
-
Filesize
265KB
MD5e704a20dd55f35e12e7aad186f1f3bc1
SHA1505f5f855bc92097413ccbf44b605287e8ca5aa7
SHA2565b8b64c570e91d014d876d61c15a793eb46fe42c50f037113437c62aaea015e8
SHA51257d0ba5688ebf831ff5ca984dadd765c8d3bba2f0670c2d3853f5ff41c667a7d515c9ab4acc6d4e7c4eb0efdafe76d3681681e1a7c8e25c56ea0dedd4a8dee26
-
Filesize
265KB
MD5e704a20dd55f35e12e7aad186f1f3bc1
SHA1505f5f855bc92097413ccbf44b605287e8ca5aa7
SHA2565b8b64c570e91d014d876d61c15a793eb46fe42c50f037113437c62aaea015e8
SHA51257d0ba5688ebf831ff5ca984dadd765c8d3bba2f0670c2d3853f5ff41c667a7d515c9ab4acc6d4e7c4eb0efdafe76d3681681e1a7c8e25c56ea0dedd4a8dee26