Analysis
-
max time kernel
150s -
max time network
80s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
05/10/2022, 00:28
Static task
static1
Behavioral task
behavioral1
Sample
cc856aa9ca3f94b4445213010f46f1caf4ef4f2d63223d2514f05be2cdd452b7.exe
Resource
win10-20220812-en
General
-
Target
cc856aa9ca3f94b4445213010f46f1caf4ef4f2d63223d2514f05be2cdd452b7.exe
-
Size
264KB
-
MD5
215ef857fb9ffa2d691874c043bcf86d
-
SHA1
9ab465e7be863abc423b25c62c33ec82b8db1dca
-
SHA256
cc856aa9ca3f94b4445213010f46f1caf4ef4f2d63223d2514f05be2cdd452b7
-
SHA512
663186c2203cfc57cf0de4dd8dca2e22224aeaaed7b2756354fa04f352491b071a3e7789d1392ea287c4d5dce56af4416046c4aa1f0da93605d70466df4bbed8
-
SSDEEP
3072:8XhxtM0LXLHtdTMYzSU5c05OAOZFBm49gsqfWrxpzbgqruEsZWpZa9uD6VdyhkSm:42CL/MYc050Bm4GfuzbgwuEpwVf
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/5036-612-0x00000000004A0000-0x00000000004A9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 2068 D798.exe 3560 E0D0.exe 5036 jvcrsaw -
Deletes itself 1 IoCs
pid Process 2420 Process not Found -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cc856aa9ca3f94b4445213010f46f1caf4ef4f2d63223d2514f05be2cdd452b7.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cc856aa9ca3f94b4445213010f46f1caf4ef4f2d63223d2514f05be2cdd452b7.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cc856aa9ca3f94b4445213010f46f1caf4ef4f2d63223d2514f05be2cdd452b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jvcrsaw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jvcrsaw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jvcrsaw -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2680 cc856aa9ca3f94b4445213010f46f1caf4ef4f2d63223d2514f05be2cdd452b7.exe 2680 cc856aa9ca3f94b4445213010f46f1caf4ef4f2d63223d2514f05be2cdd452b7.exe 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2420 Process not Found -
Suspicious behavior: MapViewOfSection 20 IoCs
pid Process 2680 cc856aa9ca3f94b4445213010f46f1caf4ef4f2d63223d2514f05be2cdd452b7.exe 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 2420 Process not Found 5036 jvcrsaw -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 2420 Process not Found Token: SeCreatePagefilePrivilege 2420 Process not Found Token: SeShutdownPrivilege 2420 Process not Found Token: SeCreatePagefilePrivilege 2420 Process not Found Token: SeShutdownPrivilege 2420 Process not Found Token: SeCreatePagefilePrivilege 2420 Process not Found Token: SeShutdownPrivilege 2420 Process not Found Token: SeCreatePagefilePrivilege 2420 Process not Found Token: SeShutdownPrivilege 2420 Process not Found Token: SeCreatePagefilePrivilege 2420 Process not Found Token: SeShutdownPrivilege 2420 Process not Found Token: SeCreatePagefilePrivilege 2420 Process not Found Token: SeShutdownPrivilege 2420 Process not Found Token: SeCreatePagefilePrivilege 2420 Process not Found Token: SeShutdownPrivilege 2420 Process not Found Token: SeCreatePagefilePrivilege 2420 Process not Found Token: SeShutdownPrivilege 2420 Process not Found Token: SeCreatePagefilePrivilege 2420 Process not Found Token: SeShutdownPrivilege 2420 Process not Found Token: SeCreatePagefilePrivilege 2420 Process not Found Token: SeShutdownPrivilege 2420 Process not Found Token: SeCreatePagefilePrivilege 2420 Process not Found Token: SeShutdownPrivilege 2420 Process not Found Token: SeCreatePagefilePrivilege 2420 Process not Found -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2068 2420 Process not Found 66 PID 2420 wrote to memory of 2068 2420 Process not Found 66 PID 2420 wrote to memory of 2068 2420 Process not Found 66 PID 2420 wrote to memory of 3560 2420 Process not Found 68 PID 2420 wrote to memory of 3560 2420 Process not Found 68 PID 2420 wrote to memory of 3560 2420 Process not Found 68 PID 2420 wrote to memory of 1104 2420 Process not Found 70 PID 2420 wrote to memory of 1104 2420 Process not Found 70 PID 2420 wrote to memory of 1104 2420 Process not Found 70 PID 2420 wrote to memory of 1104 2420 Process not Found 70 PID 2420 wrote to memory of 3644 2420 Process not Found 71 PID 2420 wrote to memory of 3644 2420 Process not Found 71 PID 2420 wrote to memory of 3644 2420 Process not Found 71 PID 2420 wrote to memory of 5076 2420 Process not Found 72 PID 2420 wrote to memory of 5076 2420 Process not Found 72 PID 2420 wrote to memory of 5076 2420 Process not Found 72 PID 2420 wrote to memory of 5076 2420 Process not Found 72 PID 2420 wrote to memory of 4044 2420 Process not Found 73 PID 2420 wrote to memory of 4044 2420 Process not Found 73 PID 2420 wrote to memory of 4044 2420 Process not Found 73 PID 2420 wrote to memory of 4604 2420 Process not Found 74 PID 2420 wrote to memory of 4604 2420 Process not Found 74 PID 2420 wrote to memory of 4604 2420 Process not Found 74 PID 2420 wrote to memory of 4604 2420 Process not Found 74 PID 2420 wrote to memory of 4948 2420 Process not Found 75 PID 2420 wrote to memory of 4948 2420 Process not Found 75 PID 2420 wrote to memory of 4948 2420 Process not Found 75 PID 2420 wrote to memory of 4948 2420 Process not Found 75 PID 2420 wrote to memory of 164 2420 Process not Found 76 PID 2420 wrote to memory of 164 2420 Process not Found 76 PID 2420 wrote to memory of 164 2420 Process not Found 76 PID 2420 wrote to memory of 164 2420 Process not Found 76 PID 2420 wrote to memory of 2452 2420 Process not Found 77 PID 2420 wrote to memory of 2452 2420 Process not Found 77 PID 2420 wrote to memory of 2452 2420 Process not Found 77 PID 2420 wrote to memory of 3856 2420 Process not Found 78 PID 2420 wrote to memory of 3856 2420 Process not Found 78 PID 2420 wrote to memory of 3856 2420 Process not Found 78 PID 2420 wrote to memory of 3856 2420 Process not Found 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc856aa9ca3f94b4445213010f46f1caf4ef4f2d63223d2514f05be2cdd452b7.exe"C:\Users\Admin\AppData\Local\Temp\cc856aa9ca3f94b4445213010f46f1caf4ef4f2d63223d2514f05be2cdd452b7.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2680
-
C:\Users\Admin\AppData\Local\Temp\D798.exeC:\Users\Admin\AppData\Local\Temp\D798.exe1⤵
- Executes dropped EXE
PID:2068
-
C:\Users\Admin\AppData\Local\Temp\E0D0.exeC:\Users\Admin\AppData\Local\Temp\E0D0.exe1⤵
- Executes dropped EXE
PID:3560
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1104
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3644
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5076
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4044
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4604
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4948
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:164
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2452
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3856
-
C:\Users\Admin\AppData\Roaming\jvcrsawC:\Users\Admin\AppData\Roaming\jvcrsaw1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5036
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
315KB
MD502d6411763283f5cc619e5c34a8f2d6b
SHA1c618bd0206e336c4e905cf32d1e05aa8773182df
SHA256e9137cd3e56b2bfab60bf565ab8351c892ecb5a083865c0841090010788ba71c
SHA5125943569e148e54967f1cb09173ab1086e6234cfa19742fe5671afe226053e750643d3ec6a384b695d24f3ebce33af01d778364fc8af75fe11ef9fd99b24ea3ff
-
Filesize
315KB
MD502d6411763283f5cc619e5c34a8f2d6b
SHA1c618bd0206e336c4e905cf32d1e05aa8773182df
SHA256e9137cd3e56b2bfab60bf565ab8351c892ecb5a083865c0841090010788ba71c
SHA5125943569e148e54967f1cb09173ab1086e6234cfa19742fe5671afe226053e750643d3ec6a384b695d24f3ebce33af01d778364fc8af75fe11ef9fd99b24ea3ff
-
Filesize
363KB
MD5b7faf4f240d48f8eabc891d7f7402739
SHA16bc97c56d5a05cb6255ebac9d711ae08284429ce
SHA2565e8c3aff6ef73355cf0e754fec4ee20f25b930c5401e50e6d183b1434c5fa2c9
SHA5129ad5a842bd379ad461265219beaa33b57df0e2488e5d73b9cf06cb016ab634b5f1ec764b146ac88ab8d8a475ae419b23f83c27ce5367dd13398ed3f67356cc5a
-
Filesize
363KB
MD5b7faf4f240d48f8eabc891d7f7402739
SHA16bc97c56d5a05cb6255ebac9d711ae08284429ce
SHA2565e8c3aff6ef73355cf0e754fec4ee20f25b930c5401e50e6d183b1434c5fa2c9
SHA5129ad5a842bd379ad461265219beaa33b57df0e2488e5d73b9cf06cb016ab634b5f1ec764b146ac88ab8d8a475ae419b23f83c27ce5367dd13398ed3f67356cc5a
-
Filesize
264KB
MD5215ef857fb9ffa2d691874c043bcf86d
SHA19ab465e7be863abc423b25c62c33ec82b8db1dca
SHA256cc856aa9ca3f94b4445213010f46f1caf4ef4f2d63223d2514f05be2cdd452b7
SHA512663186c2203cfc57cf0de4dd8dca2e22224aeaaed7b2756354fa04f352491b071a3e7789d1392ea287c4d5dce56af4416046c4aa1f0da93605d70466df4bbed8
-
Filesize
264KB
MD5215ef857fb9ffa2d691874c043bcf86d
SHA19ab465e7be863abc423b25c62c33ec82b8db1dca
SHA256cc856aa9ca3f94b4445213010f46f1caf4ef4f2d63223d2514f05be2cdd452b7
SHA512663186c2203cfc57cf0de4dd8dca2e22224aeaaed7b2756354fa04f352491b071a3e7789d1392ea287c4d5dce56af4416046c4aa1f0da93605d70466df4bbed8