Analysis
-
max time kernel
152s -
max time network
52s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
11/10/2022, 14:36
Static task
static1
Behavioral task
behavioral1
Sample
677172ec9e6d6237a49099f2dbba3a9b0f5d1b61dfe1845d837a9379fb2fccc3.exe
Resource
win10-20220812-en
General
-
Target
677172ec9e6d6237a49099f2dbba3a9b0f5d1b61dfe1845d837a9379fb2fccc3.exe
-
Size
216KB
-
MD5
93671c0e6758202063572d028c294347
-
SHA1
43939fa0a281b6222f4f0a2892e97332c8b2e892
-
SHA256
677172ec9e6d6237a49099f2dbba3a9b0f5d1b61dfe1845d837a9379fb2fccc3
-
SHA512
6fd3c59efffd18465a50b6361d2d3f703a5bd0cf3077df412aefc681b7d177b5bce1b54e22f6a1f83f8c476a4b05c539062f6b0629d10534e7e402b1c92c4785
-
SSDEEP
3072:hUi1FUGs98mWvLPLVITt8BM1m1auoWhYEI8iRfp1z+yrjGajbWL6juuyBO:hU0UfGLPLVIx7uZY/9RfnnjGajKYeB
Malware Config
Signatures
-
Detects Smokeloader packer 5 IoCs
resource yara_rule behavioral1/memory/1680-144-0x0000000000710000-0x0000000000719000-memory.dmp family_smokeloader behavioral1/memory/2604-150-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2604-151-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/2604-165-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2604-183-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3012 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1680 set thread context of 2604 1680 677172ec9e6d6237a49099f2dbba3a9b0f5d1b61dfe1845d837a9379fb2fccc3.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 677172ec9e6d6237a49099f2dbba3a9b0f5d1b61dfe1845d837a9379fb2fccc3.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 677172ec9e6d6237a49099f2dbba3a9b0f5d1b61dfe1845d837a9379fb2fccc3.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 677172ec9e6d6237a49099f2dbba3a9b0f5d1b61dfe1845d837a9379fb2fccc3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2604 677172ec9e6d6237a49099f2dbba3a9b0f5d1b61dfe1845d837a9379fb2fccc3.exe 2604 677172ec9e6d6237a49099f2dbba3a9b0f5d1b61dfe1845d837a9379fb2fccc3.exe 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found 3012 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3012 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2604 677172ec9e6d6237a49099f2dbba3a9b0f5d1b61dfe1845d837a9379fb2fccc3.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 Process not Found -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3012 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2604 1680 677172ec9e6d6237a49099f2dbba3a9b0f5d1b61dfe1845d837a9379fb2fccc3.exe 66 PID 1680 wrote to memory of 2604 1680 677172ec9e6d6237a49099f2dbba3a9b0f5d1b61dfe1845d837a9379fb2fccc3.exe 66 PID 1680 wrote to memory of 2604 1680 677172ec9e6d6237a49099f2dbba3a9b0f5d1b61dfe1845d837a9379fb2fccc3.exe 66 PID 1680 wrote to memory of 2604 1680 677172ec9e6d6237a49099f2dbba3a9b0f5d1b61dfe1845d837a9379fb2fccc3.exe 66 PID 1680 wrote to memory of 2604 1680 677172ec9e6d6237a49099f2dbba3a9b0f5d1b61dfe1845d837a9379fb2fccc3.exe 66 PID 1680 wrote to memory of 2604 1680 677172ec9e6d6237a49099f2dbba3a9b0f5d1b61dfe1845d837a9379fb2fccc3.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\677172ec9e6d6237a49099f2dbba3a9b0f5d1b61dfe1845d837a9379fb2fccc3.exe"C:\Users\Admin\AppData\Local\Temp\677172ec9e6d6237a49099f2dbba3a9b0f5d1b61dfe1845d837a9379fb2fccc3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\677172ec9e6d6237a49099f2dbba3a9b0f5d1b61dfe1845d837a9379fb2fccc3.exe"C:\Users\Admin\AppData\Local\Temp\677172ec9e6d6237a49099f2dbba3a9b0f5d1b61dfe1845d837a9379fb2fccc3.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2604
-