Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2022, 07:37
Static task
static1
Behavioral task
behavioral1
Sample
0acf8d08bfb9a634bb6c402606d75020d33825edb88f8d2825088b9d66903231.exe
Resource
win10v2004-20220812-en
General
-
Target
0acf8d08bfb9a634bb6c402606d75020d33825edb88f8d2825088b9d66903231.exe
-
Size
260KB
-
MD5
1207574805ab0ff6312808b32e75f8ef
-
SHA1
b8238cb5e2d2690202cff0cb5cdf2918cbd089b6
-
SHA256
0acf8d08bfb9a634bb6c402606d75020d33825edb88f8d2825088b9d66903231
-
SHA512
8c7df0fe1a35d77002dcc3f599234125b251bf3c06c5be58d341e6917305b17a767a621579c15e3bd9386f9bd1e47a3bfd0f0da5fbb173a598e34cf031d77c2b
-
SSDEEP
3072:9XhS4iecsJTjSMJzMw5LaDe7m2xc5yRFCKASZAhBuT7+M/h3qpZa9uD6VdyhkekP:5E4Du8r3S2QSAvTFrwVfeXO
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/828-133-0x0000000000590000-0x0000000000599000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 1 IoCs
pid Process 4400 wbgbred -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0acf8d08bfb9a634bb6c402606d75020d33825edb88f8d2825088b9d66903231.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wbgbred Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wbgbred Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wbgbred Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0acf8d08bfb9a634bb6c402606d75020d33825edb88f8d2825088b9d66903231.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0acf8d08bfb9a634bb6c402606d75020d33825edb88f8d2825088b9d66903231.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 828 0acf8d08bfb9a634bb6c402606d75020d33825edb88f8d2825088b9d66903231.exe 828 0acf8d08bfb9a634bb6c402606d75020d33825edb88f8d2825088b9d66903231.exe 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found 1124 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1124 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 828 0acf8d08bfb9a634bb6c402606d75020d33825edb88f8d2825088b9d66903231.exe 4400 wbgbred
Processes
-
C:\Users\Admin\AppData\Local\Temp\0acf8d08bfb9a634bb6c402606d75020d33825edb88f8d2825088b9d66903231.exe"C:\Users\Admin\AppData\Local\Temp\0acf8d08bfb9a634bb6c402606d75020d33825edb88f8d2825088b9d66903231.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:828
-
C:\Users\Admin\AppData\Roaming\wbgbredC:\Users\Admin\AppData\Roaming\wbgbred1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4400
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD51207574805ab0ff6312808b32e75f8ef
SHA1b8238cb5e2d2690202cff0cb5cdf2918cbd089b6
SHA2560acf8d08bfb9a634bb6c402606d75020d33825edb88f8d2825088b9d66903231
SHA5128c7df0fe1a35d77002dcc3f599234125b251bf3c06c5be58d341e6917305b17a767a621579c15e3bd9386f9bd1e47a3bfd0f0da5fbb173a598e34cf031d77c2b
-
Filesize
260KB
MD51207574805ab0ff6312808b32e75f8ef
SHA1b8238cb5e2d2690202cff0cb5cdf2918cbd089b6
SHA2560acf8d08bfb9a634bb6c402606d75020d33825edb88f8d2825088b9d66903231
SHA5128c7df0fe1a35d77002dcc3f599234125b251bf3c06c5be58d341e6917305b17a767a621579c15e3bd9386f9bd1e47a3bfd0f0da5fbb173a598e34cf031d77c2b