Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2022, 08:07
Static task
static1
Behavioral task
behavioral1
Sample
7b79c2e9de444ab5a6307308257ab620d8ef2ef0ce1d55fdccfc5c366a0cedeb.exe
Resource
win10v2004-20220812-en
General
-
Target
7b79c2e9de444ab5a6307308257ab620d8ef2ef0ce1d55fdccfc5c366a0cedeb.exe
-
Size
270KB
-
MD5
2355d1b245c60843cbb45fac91cc818d
-
SHA1
2e28b101b9dc5f20559b3d465c43e7645d1b90e0
-
SHA256
7b79c2e9de444ab5a6307308257ab620d8ef2ef0ce1d55fdccfc5c366a0cedeb
-
SHA512
4345398149db26a3a7bc13c82aa9c9b267a4383aeed5d1bde309f334c63767e334431e8f8c32d81d36888219916fbd48b24996dcbc9cc84b5a9bb31cda7d2967
-
SSDEEP
3072:4Xhwo0Blu7ESUK7AEY5NdCZAXe/WL3XmkBpUPufeOLM/h3qpZa9uD6VdyhkhUuSr:Mz2lgAEEFQg329ILrwVfquSs
Malware Config
Signatures
-
Detects Smokeloader packer 6 IoCs
resource yara_rule behavioral1/memory/1156-133-0x0000000002180000-0x0000000002189000-memory.dmp family_smokeloader behavioral1/memory/2068-135-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2068-137-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2068-138-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/928-145-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/928-146-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 3620 hajevvv 928 hajevvv -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1156 set thread context of 2068 1156 7b79c2e9de444ab5a6307308257ab620d8ef2ef0ce1d55fdccfc5c366a0cedeb.exe 82 PID 3620 set thread context of 928 3620 hajevvv 91 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7b79c2e9de444ab5a6307308257ab620d8ef2ef0ce1d55fdccfc5c366a0cedeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hajevvv Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hajevvv Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hajevvv Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7b79c2e9de444ab5a6307308257ab620d8ef2ef0ce1d55fdccfc5c366a0cedeb.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7b79c2e9de444ab5a6307308257ab620d8ef2ef0ce1d55fdccfc5c366a0cedeb.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2068 7b79c2e9de444ab5a6307308257ab620d8ef2ef0ce1d55fdccfc5c366a0cedeb.exe 2068 7b79c2e9de444ab5a6307308257ab620d8ef2ef0ce1d55fdccfc5c366a0cedeb.exe 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found 2864 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2864 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2068 7b79c2e9de444ab5a6307308257ab620d8ef2ef0ce1d55fdccfc5c366a0cedeb.exe 928 hajevvv -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2864 Process not Found Token: SeCreatePagefilePrivilege 2864 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1156 wrote to memory of 2068 1156 7b79c2e9de444ab5a6307308257ab620d8ef2ef0ce1d55fdccfc5c366a0cedeb.exe 82 PID 1156 wrote to memory of 2068 1156 7b79c2e9de444ab5a6307308257ab620d8ef2ef0ce1d55fdccfc5c366a0cedeb.exe 82 PID 1156 wrote to memory of 2068 1156 7b79c2e9de444ab5a6307308257ab620d8ef2ef0ce1d55fdccfc5c366a0cedeb.exe 82 PID 1156 wrote to memory of 2068 1156 7b79c2e9de444ab5a6307308257ab620d8ef2ef0ce1d55fdccfc5c366a0cedeb.exe 82 PID 1156 wrote to memory of 2068 1156 7b79c2e9de444ab5a6307308257ab620d8ef2ef0ce1d55fdccfc5c366a0cedeb.exe 82 PID 1156 wrote to memory of 2068 1156 7b79c2e9de444ab5a6307308257ab620d8ef2ef0ce1d55fdccfc5c366a0cedeb.exe 82 PID 3620 wrote to memory of 928 3620 hajevvv 91 PID 3620 wrote to memory of 928 3620 hajevvv 91 PID 3620 wrote to memory of 928 3620 hajevvv 91 PID 3620 wrote to memory of 928 3620 hajevvv 91 PID 3620 wrote to memory of 928 3620 hajevvv 91 PID 3620 wrote to memory of 928 3620 hajevvv 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b79c2e9de444ab5a6307308257ab620d8ef2ef0ce1d55fdccfc5c366a0cedeb.exe"C:\Users\Admin\AppData\Local\Temp\7b79c2e9de444ab5a6307308257ab620d8ef2ef0ce1d55fdccfc5c366a0cedeb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\7b79c2e9de444ab5a6307308257ab620d8ef2ef0ce1d55fdccfc5c366a0cedeb.exe"C:\Users\Admin\AppData\Local\Temp\7b79c2e9de444ab5a6307308257ab620d8ef2ef0ce1d55fdccfc5c366a0cedeb.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2068
-
-
C:\Users\Admin\AppData\Roaming\hajevvvC:\Users\Admin\AppData\Roaming\hajevvv1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Roaming\hajevvvC:\Users\Admin\AppData\Roaming\hajevvv2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:928
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
270KB
MD52355d1b245c60843cbb45fac91cc818d
SHA12e28b101b9dc5f20559b3d465c43e7645d1b90e0
SHA2567b79c2e9de444ab5a6307308257ab620d8ef2ef0ce1d55fdccfc5c366a0cedeb
SHA5124345398149db26a3a7bc13c82aa9c9b267a4383aeed5d1bde309f334c63767e334431e8f8c32d81d36888219916fbd48b24996dcbc9cc84b5a9bb31cda7d2967
-
Filesize
270KB
MD52355d1b245c60843cbb45fac91cc818d
SHA12e28b101b9dc5f20559b3d465c43e7645d1b90e0
SHA2567b79c2e9de444ab5a6307308257ab620d8ef2ef0ce1d55fdccfc5c366a0cedeb
SHA5124345398149db26a3a7bc13c82aa9c9b267a4383aeed5d1bde309f334c63767e334431e8f8c32d81d36888219916fbd48b24996dcbc9cc84b5a9bb31cda7d2967
-
Filesize
270KB
MD52355d1b245c60843cbb45fac91cc818d
SHA12e28b101b9dc5f20559b3d465c43e7645d1b90e0
SHA2567b79c2e9de444ab5a6307308257ab620d8ef2ef0ce1d55fdccfc5c366a0cedeb
SHA5124345398149db26a3a7bc13c82aa9c9b267a4383aeed5d1bde309f334c63767e334431e8f8c32d81d36888219916fbd48b24996dcbc9cc84b5a9bb31cda7d2967