Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
05/10/2022, 18:01
Static task
static1
Behavioral task
behavioral1
Sample
d708477f7f731143c5acdcd60e8a477bb9752ff880570680acc5d5c9c3f02028.exe
Resource
win10-20220812-en
9 signatures
150 seconds
General
-
Target
d708477f7f731143c5acdcd60e8a477bb9752ff880570680acc5d5c9c3f02028.exe
-
Size
272KB
-
MD5
cdf06cc9bdb740ab0ab90e2b51ca4c16
-
SHA1
a38b7bfcb4e3e40a56aefaa7bad5b8feb2c73ce9
-
SHA256
d708477f7f731143c5acdcd60e8a477bb9752ff880570680acc5d5c9c3f02028
-
SHA512
949e08dc58dbb7fec834ed574adb3105e8ddb811fd8d7bb9f983c210925feb18883be06d72f8cf3f15597191429b17a4f948fd680a168aeb1adfa7f48b761554
-
SSDEEP
6144:NCjRYMLGpuyq1JOfkpBuzbgwuBTsOwVfU4:N3M6puyq6iunnvO4
Score
10/10
Malware Config
Signatures
-
Detects Smokeloader packer 5 IoCs
resource yara_rule behavioral1/memory/4764-173-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3812-152-0x0000000002020000-0x0000000002029000-memory.dmp family_smokeloader behavioral1/memory/4764-145-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4764-146-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/4764-179-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3040 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3812 set thread context of 4764 3812 d708477f7f731143c5acdcd60e8a477bb9752ff880570680acc5d5c9c3f02028.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d708477f7f731143c5acdcd60e8a477bb9752ff880570680acc5d5c9c3f02028.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d708477f7f731143c5acdcd60e8a477bb9752ff880570680acc5d5c9c3f02028.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d708477f7f731143c5acdcd60e8a477bb9752ff880570680acc5d5c9c3f02028.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4764 d708477f7f731143c5acdcd60e8a477bb9752ff880570680acc5d5c9c3f02028.exe 4764 d708477f7f731143c5acdcd60e8a477bb9752ff880570680acc5d5c9c3f02028.exe 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3040 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4764 d708477f7f731143c5acdcd60e8a477bb9752ff880570680acc5d5c9c3f02028.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3812 wrote to memory of 4764 3812 d708477f7f731143c5acdcd60e8a477bb9752ff880570680acc5d5c9c3f02028.exe 66 PID 3812 wrote to memory of 4764 3812 d708477f7f731143c5acdcd60e8a477bb9752ff880570680acc5d5c9c3f02028.exe 66 PID 3812 wrote to memory of 4764 3812 d708477f7f731143c5acdcd60e8a477bb9752ff880570680acc5d5c9c3f02028.exe 66 PID 3812 wrote to memory of 4764 3812 d708477f7f731143c5acdcd60e8a477bb9752ff880570680acc5d5c9c3f02028.exe 66 PID 3812 wrote to memory of 4764 3812 d708477f7f731143c5acdcd60e8a477bb9752ff880570680acc5d5c9c3f02028.exe 66 PID 3812 wrote to memory of 4764 3812 d708477f7f731143c5acdcd60e8a477bb9752ff880570680acc5d5c9c3f02028.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\d708477f7f731143c5acdcd60e8a477bb9752ff880570680acc5d5c9c3f02028.exe"C:\Users\Admin\AppData\Local\Temp\d708477f7f731143c5acdcd60e8a477bb9752ff880570680acc5d5c9c3f02028.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\d708477f7f731143c5acdcd60e8a477bb9752ff880570680acc5d5c9c3f02028.exe"C:\Users\Admin\AppData\Local\Temp\d708477f7f731143c5acdcd60e8a477bb9752ff880570680acc5d5c9c3f02028.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4764
-