Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05-10-2022 23:22

General

  • Target

    5acde26976767956125b12f1448400d44990350cb73df641f30595450533e76e.exe

  • Size

    146KB

  • MD5

    00f266422f822e813ea68834b1be564e

  • SHA1

    d07713c62a06de84f11d60faba3be1c5fc5184b0

  • SHA256

    5acde26976767956125b12f1448400d44990350cb73df641f30595450533e76e

  • SHA512

    b8878838c0f3aa0ed7e57b14947e8a156cbfb88576d5363b4f02a9fe184135984dc6c376ba5523e57732bdf86b82f7d2f1ceb9c05d479d5d881a82c2388238eb

  • SSDEEP

    1536:IRltpp1ROoBTjrphfqvg1Ss48SqH0WJOHiMU1Axo/QSPhgOJnZjlGRXdILOi:IRlLNthf58bY1OHiMUrTmOJnZjljO

Malware Config

Signatures

  • Detects Smokeloader packer 5 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5acde26976767956125b12f1448400d44990350cb73df641f30595450533e76e.exe
    "C:\Users\Admin\AppData\Local\Temp\5acde26976767956125b12f1448400d44990350cb73df641f30595450533e76e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Users\Admin\AppData\Local\Temp\5acde26976767956125b12f1448400d44990350cb73df641f30595450533e76e.exe
      "C:\Users\Admin\AppData\Local\Temp\5acde26976767956125b12f1448400d44990350cb73df641f30595450533e76e.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:4548

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2688-150-0x00000000006F0000-0x00000000006F9000-memory.dmp
    Filesize

    36KB

  • memory/2688-116-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-117-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-118-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-119-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-120-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-121-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-122-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-123-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-124-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-126-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-125-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-127-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-128-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-129-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-130-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-131-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-133-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-134-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-132-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-135-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-136-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-137-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-139-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-138-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-140-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-142-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-141-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-148-0x000000000081A000-0x000000000082A000-memory.dmp
    Filesize

    64KB

  • memory/2688-115-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-146-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-163-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-154-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-156-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-157-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-159-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-158-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-160-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-155-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-152-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-149-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-151-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-143-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB

  • memory/4548-147-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-145-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-144-0x0000000000402DD8-mapping.dmp
  • memory/4548-162-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB

  • memory/4548-153-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-165-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-167-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-168-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-169-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-170-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-166-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-171-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-164-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-161-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-172-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-173-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-175-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-174-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-176-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/4548-177-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB