Resubmissions

05-10-2022 20:36

221005-zdv4lafef2 10

05-10-2022 20:14

221005-y1ffzsfgak 10

Analysis

  • max time kernel
    151s
  • max time network
    70s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05-10-2022 20:14

General

  • Target

    d984d9e4684f993cd6b48cac05816616f5eec2ff6d6fe8785fe076f0eec79ef0.exe

  • Size

    270KB

  • MD5

    f7e78f6e1cb5fca7e70ba5ecd1764313

  • SHA1

    63f3bd66f0812ef9becbde93305b42797ec7ee87

  • SHA256

    d984d9e4684f993cd6b48cac05816616f5eec2ff6d6fe8785fe076f0eec79ef0

  • SHA512

    8115c2f0c40d54952639f2c1ef39604ebf010fc8f0987a5f73ac234ea898715063e108d925b6baf03b8dcc852a16981d79108b21aa422f702d12d672e805770c

  • SSDEEP

    6144:8qjNwNLb4Uyrq/3Ok3g7ruzbgwuCEFFPvNwVfUPk:8q0/4UAq/3Ok6unnyFPvzc

Malware Config

Signatures

  • Detects Smokeloader packer 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d984d9e4684f993cd6b48cac05816616f5eec2ff6d6fe8785fe076f0eec79ef0.exe
    "C:\Users\Admin\AppData\Local\Temp\d984d9e4684f993cd6b48cac05816616f5eec2ff6d6fe8785fe076f0eec79ef0.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2628
    • C:\Users\Admin\AppData\Local\Temp\d984d9e4684f993cd6b48cac05816616f5eec2ff6d6fe8785fe076f0eec79ef0.exe
      "C:\Users\Admin\AppData\Local\Temp\d984d9e4684f993cd6b48cac05816616f5eec2ff6d6fe8785fe076f0eec79ef0.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:4048

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2628-120-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-121-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-122-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-123-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-124-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-125-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-126-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-127-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-128-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-129-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-130-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-131-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-132-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-133-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-134-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-135-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-136-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-137-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-138-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-139-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-140-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-141-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-142-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-143-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-145-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-146-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-147-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-148-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/2628-149-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-150-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB

  • memory/4048-151-0x0000000000402DD8-mapping.dmp
  • memory/4048-152-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-153-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-154-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-155-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-156-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-157-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-158-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-159-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-160-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-161-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-163-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-164-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-162-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-165-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB

  • memory/4048-166-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-167-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-168-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-169-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-170-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-171-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-172-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-173-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-175-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-174-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-176-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-177-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-178-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-180-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-181-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-179-0x0000000077C80000-0x0000000077E0E000-memory.dmp
    Filesize

    1.6MB

  • memory/4048-182-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB