Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
10/10/2022, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
fa6974932d96986c02c70893ab583a6fa5e620b100037dfc535a8c54392a0c1a.exe
Resource
win10-20220812-en
9 signatures
150 seconds
General
-
Target
fa6974932d96986c02c70893ab583a6fa5e620b100037dfc535a8c54392a0c1a.exe
-
Size
270KB
-
MD5
faf2a2ea28f99e7991e29476d71a409c
-
SHA1
26e233825fcdfc442d70fa7ec792d61744196b23
-
SHA256
fa6974932d96986c02c70893ab583a6fa5e620b100037dfc535a8c54392a0c1a
-
SHA512
481b80254b80b15b610970f28564d0a6886b8f1951d3164b5bdbdf580e3d9031808f05fbb35b52aef478c443f518dd0a4c2c5c59acfe1b170dfc475b71911ea2
-
SSDEEP
3072:gXhC938a4eOUW+ze2MVO5zLGBHDWXu7dXX4xEDM/h3qpZa9uD6VdyhkhUuS:U8sFqeBULsHqUXI+rwVfquS
Score
10/10
Malware Config
Signatures
-
Detects Smokeloader packer 5 IoCs
resource yara_rule behavioral1/memory/2660-146-0x00000000004A0000-0x00000000004A9000-memory.dmp family_smokeloader behavioral1/memory/4124-150-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4124-151-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/4124-169-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4124-183-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3056 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2660 set thread context of 4124 2660 fa6974932d96986c02c70893ab583a6fa5e620b100037dfc535a8c54392a0c1a.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fa6974932d96986c02c70893ab583a6fa5e620b100037dfc535a8c54392a0c1a.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fa6974932d96986c02c70893ab583a6fa5e620b100037dfc535a8c54392a0c1a.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fa6974932d96986c02c70893ab583a6fa5e620b100037dfc535a8c54392a0c1a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4124 fa6974932d96986c02c70893ab583a6fa5e620b100037dfc535a8c54392a0c1a.exe 4124 fa6974932d96986c02c70893ab583a6fa5e620b100037dfc535a8c54392a0c1a.exe 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3056 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4124 fa6974932d96986c02c70893ab583a6fa5e620b100037dfc535a8c54392a0c1a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2660 wrote to memory of 4124 2660 fa6974932d96986c02c70893ab583a6fa5e620b100037dfc535a8c54392a0c1a.exe 66 PID 2660 wrote to memory of 4124 2660 fa6974932d96986c02c70893ab583a6fa5e620b100037dfc535a8c54392a0c1a.exe 66 PID 2660 wrote to memory of 4124 2660 fa6974932d96986c02c70893ab583a6fa5e620b100037dfc535a8c54392a0c1a.exe 66 PID 2660 wrote to memory of 4124 2660 fa6974932d96986c02c70893ab583a6fa5e620b100037dfc535a8c54392a0c1a.exe 66 PID 2660 wrote to memory of 4124 2660 fa6974932d96986c02c70893ab583a6fa5e620b100037dfc535a8c54392a0c1a.exe 66 PID 2660 wrote to memory of 4124 2660 fa6974932d96986c02c70893ab583a6fa5e620b100037dfc535a8c54392a0c1a.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa6974932d96986c02c70893ab583a6fa5e620b100037dfc535a8c54392a0c1a.exe"C:\Users\Admin\AppData\Local\Temp\fa6974932d96986c02c70893ab583a6fa5e620b100037dfc535a8c54392a0c1a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\fa6974932d96986c02c70893ab583a6fa5e620b100037dfc535a8c54392a0c1a.exe"C:\Users\Admin\AppData\Local\Temp\fa6974932d96986c02c70893ab583a6fa5e620b100037dfc535a8c54392a0c1a.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4124
-