Analysis
-
max time kernel
163s -
max time network
167s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
04/10/2022, 00:14
Static task
static1
Behavioral task
behavioral1
Sample
79c7e3f67639f407acf52acad3ad31777500e240041ff71e4ef1a45cc2f79ae7.exe
Resource
win10-20220812-en
General
-
Target
79c7e3f67639f407acf52acad3ad31777500e240041ff71e4ef1a45cc2f79ae7.exe
-
Size
264KB
-
MD5
e7ba792d98bbf7dfc6427816780758a3
-
SHA1
a53f80be6fdb3ed181e8b7bfd67c5f190b86bb4d
-
SHA256
79c7e3f67639f407acf52acad3ad31777500e240041ff71e4ef1a45cc2f79ae7
-
SHA512
fde5610ec9f304019dfa24d3b24be5e33b81a16e4dfa830d0758ceb58637497b1a38b9655bf00bdbd89f7f40d56499b4f218f53cb25da6c9913528b8a486c103
-
SSDEEP
3072:YXhKHMJfzlgy2PbpC15TIYmxuHiePcy4najRAyq8W5sbahviLC9WrxpzbgqruzHw:s81hziXPcFAbahvoOuzbgwuxvgwVf
Malware Config
Signatures
-
Detects Smokeloader packer 4 IoCs
resource yara_rule behavioral1/memory/380-151-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/380-152-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/380-161-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/380-183-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 2896 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 68 set thread context of 380 68 79c7e3f67639f407acf52acad3ad31777500e240041ff71e4ef1a45cc2f79ae7.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 79c7e3f67639f407acf52acad3ad31777500e240041ff71e4ef1a45cc2f79ae7.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 79c7e3f67639f407acf52acad3ad31777500e240041ff71e4ef1a45cc2f79ae7.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 79c7e3f67639f407acf52acad3ad31777500e240041ff71e4ef1a45cc2f79ae7.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 380 79c7e3f67639f407acf52acad3ad31777500e240041ff71e4ef1a45cc2f79ae7.exe 380 79c7e3f67639f407acf52acad3ad31777500e240041ff71e4ef1a45cc2f79ae7.exe 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2896 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 380 79c7e3f67639f407acf52acad3ad31777500e240041ff71e4ef1a45cc2f79ae7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 68 wrote to memory of 380 68 79c7e3f67639f407acf52acad3ad31777500e240041ff71e4ef1a45cc2f79ae7.exe 66 PID 68 wrote to memory of 380 68 79c7e3f67639f407acf52acad3ad31777500e240041ff71e4ef1a45cc2f79ae7.exe 66 PID 68 wrote to memory of 380 68 79c7e3f67639f407acf52acad3ad31777500e240041ff71e4ef1a45cc2f79ae7.exe 66 PID 68 wrote to memory of 380 68 79c7e3f67639f407acf52acad3ad31777500e240041ff71e4ef1a45cc2f79ae7.exe 66 PID 68 wrote to memory of 380 68 79c7e3f67639f407acf52acad3ad31777500e240041ff71e4ef1a45cc2f79ae7.exe 66 PID 68 wrote to memory of 380 68 79c7e3f67639f407acf52acad3ad31777500e240041ff71e4ef1a45cc2f79ae7.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\79c7e3f67639f407acf52acad3ad31777500e240041ff71e4ef1a45cc2f79ae7.exe"C:\Users\Admin\AppData\Local\Temp\79c7e3f67639f407acf52acad3ad31777500e240041ff71e4ef1a45cc2f79ae7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:68 -
C:\Users\Admin\AppData\Local\Temp\79c7e3f67639f407acf52acad3ad31777500e240041ff71e4ef1a45cc2f79ae7.exe"C:\Users\Admin\AppData\Local\Temp\79c7e3f67639f407acf52acad3ad31777500e240041ff71e4ef1a45cc2f79ae7.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:380
-