Analysis
-
max time kernel
189s -
max time network
183s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
11/10/2022, 20:21
Static task
static1
Behavioral task
behavioral1
Sample
20d6a2324f422d2a76f7af60c0817e1362b34ecbc21789e209754b59e8a1310f.exe
Resource
win10-20220812-en
9 signatures
150 seconds
General
-
Target
20d6a2324f422d2a76f7af60c0817e1362b34ecbc21789e209754b59e8a1310f.exe
-
Size
215KB
-
MD5
cae2b813b35b27c7816b6ccf796f64d5
-
SHA1
ebb4b7dd5ff4bb8207e97579f6acd4641d987370
-
SHA256
20d6a2324f422d2a76f7af60c0817e1362b34ecbc21789e209754b59e8a1310f
-
SHA512
5e997ee7fd63f95951efbfb007fa8c7f2b42ccc587e33182f2c27688586a007ade6065f9134a38a2553680328594566b02f4e39f68ed10e7ffe5500c781c207b
-
SSDEEP
3072:pjsh2ZI7gqfrLW56PM/ZvGsF1255s5mmNDVm9Fd/6qBssrngHbO:JouGzLW5N/WPsomWSqBssrng7
Score
10/10
Malware Config
Signatures
-
Detects Smokeloader packer 4 IoCs
resource yara_rule behavioral1/memory/4620-146-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4620-147-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/4620-157-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4620-178-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3032 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2692 set thread context of 4620 2692 20d6a2324f422d2a76f7af60c0817e1362b34ecbc21789e209754b59e8a1310f.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 20d6a2324f422d2a76f7af60c0817e1362b34ecbc21789e209754b59e8a1310f.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 20d6a2324f422d2a76f7af60c0817e1362b34ecbc21789e209754b59e8a1310f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 20d6a2324f422d2a76f7af60c0817e1362b34ecbc21789e209754b59e8a1310f.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4620 20d6a2324f422d2a76f7af60c0817e1362b34ecbc21789e209754b59e8a1310f.exe 4620 20d6a2324f422d2a76f7af60c0817e1362b34ecbc21789e209754b59e8a1310f.exe 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3032 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4620 20d6a2324f422d2a76f7af60c0817e1362b34ecbc21789e209754b59e8a1310f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2692 wrote to memory of 4620 2692 20d6a2324f422d2a76f7af60c0817e1362b34ecbc21789e209754b59e8a1310f.exe 66 PID 2692 wrote to memory of 4620 2692 20d6a2324f422d2a76f7af60c0817e1362b34ecbc21789e209754b59e8a1310f.exe 66 PID 2692 wrote to memory of 4620 2692 20d6a2324f422d2a76f7af60c0817e1362b34ecbc21789e209754b59e8a1310f.exe 66 PID 2692 wrote to memory of 4620 2692 20d6a2324f422d2a76f7af60c0817e1362b34ecbc21789e209754b59e8a1310f.exe 66 PID 2692 wrote to memory of 4620 2692 20d6a2324f422d2a76f7af60c0817e1362b34ecbc21789e209754b59e8a1310f.exe 66 PID 2692 wrote to memory of 4620 2692 20d6a2324f422d2a76f7af60c0817e1362b34ecbc21789e209754b59e8a1310f.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\20d6a2324f422d2a76f7af60c0817e1362b34ecbc21789e209754b59e8a1310f.exe"C:\Users\Admin\AppData\Local\Temp\20d6a2324f422d2a76f7af60c0817e1362b34ecbc21789e209754b59e8a1310f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\20d6a2324f422d2a76f7af60c0817e1362b34ecbc21789e209754b59e8a1310f.exe"C:\Users\Admin\AppData\Local\Temp\20d6a2324f422d2a76f7af60c0817e1362b34ecbc21789e209754b59e8a1310f.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4620
-