Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
12/10/2022, 09:49
Static task
static1
Behavioral task
behavioral1
Sample
33dd4c2ce64fc38b0e15b3ab7cc362faeec2d3c0b5a26c72f9b7887e4f1e6b6c.exe
Resource
win10-20220812-en
General
-
Target
33dd4c2ce64fc38b0e15b3ab7cc362faeec2d3c0b5a26c72f9b7887e4f1e6b6c.exe
-
Size
301KB
-
MD5
0ca249312473fc1bd15cc25f2322c9b9
-
SHA1
ea1c8ea5d3982b3050199312f9923c516acdb35f
-
SHA256
33dd4c2ce64fc38b0e15b3ab7cc362faeec2d3c0b5a26c72f9b7887e4f1e6b6c
-
SHA512
32ab0d7d28171e8040e9d1a90ee45c0b568eae579882ef4dab485c2aa2e5be8f28d29d2edf87989feec3a119cbde603999667093eea71f9fe78c189cd71b8012
-
SSDEEP
6144:w7SOFroztCVlvtmdw5r7pUGaSQCxeigavwVfquS0n:w2i8JCV1tOwhn5QyTZa
Malware Config
Signatures
-
Detects Smokeloader packer 8 IoCs
resource yara_rule behavioral1/memory/2432-150-0x00000000004B0000-0x00000000004B9000-memory.dmp family_smokeloader behavioral1/memory/3004-147-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/3004-146-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3004-163-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3004-179-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2904-212-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/2904-244-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2904-245-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 4832 cjerwcc 2904 cjerwcc -
Deletes itself 1 IoCs
pid Process 3104 Process not Found -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2432 set thread context of 3004 2432 33dd4c2ce64fc38b0e15b3ab7cc362faeec2d3c0b5a26c72f9b7887e4f1e6b6c.exe 66 PID 4832 set thread context of 2904 4832 cjerwcc 68 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cjerwcc Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cjerwcc Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 33dd4c2ce64fc38b0e15b3ab7cc362faeec2d3c0b5a26c72f9b7887e4f1e6b6c.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 33dd4c2ce64fc38b0e15b3ab7cc362faeec2d3c0b5a26c72f9b7887e4f1e6b6c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 33dd4c2ce64fc38b0e15b3ab7cc362faeec2d3c0b5a26c72f9b7887e4f1e6b6c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cjerwcc -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3004 33dd4c2ce64fc38b0e15b3ab7cc362faeec2d3c0b5a26c72f9b7887e4f1e6b6c.exe 3004 33dd4c2ce64fc38b0e15b3ab7cc362faeec2d3c0b5a26c72f9b7887e4f1e6b6c.exe 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found 3104 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3104 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3004 33dd4c2ce64fc38b0e15b3ab7cc362faeec2d3c0b5a26c72f9b7887e4f1e6b6c.exe 2904 cjerwcc -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3104 Process not Found Token: SeCreatePagefilePrivilege 3104 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2432 wrote to memory of 3004 2432 33dd4c2ce64fc38b0e15b3ab7cc362faeec2d3c0b5a26c72f9b7887e4f1e6b6c.exe 66 PID 2432 wrote to memory of 3004 2432 33dd4c2ce64fc38b0e15b3ab7cc362faeec2d3c0b5a26c72f9b7887e4f1e6b6c.exe 66 PID 2432 wrote to memory of 3004 2432 33dd4c2ce64fc38b0e15b3ab7cc362faeec2d3c0b5a26c72f9b7887e4f1e6b6c.exe 66 PID 2432 wrote to memory of 3004 2432 33dd4c2ce64fc38b0e15b3ab7cc362faeec2d3c0b5a26c72f9b7887e4f1e6b6c.exe 66 PID 2432 wrote to memory of 3004 2432 33dd4c2ce64fc38b0e15b3ab7cc362faeec2d3c0b5a26c72f9b7887e4f1e6b6c.exe 66 PID 2432 wrote to memory of 3004 2432 33dd4c2ce64fc38b0e15b3ab7cc362faeec2d3c0b5a26c72f9b7887e4f1e6b6c.exe 66 PID 4832 wrote to memory of 2904 4832 cjerwcc 68 PID 4832 wrote to memory of 2904 4832 cjerwcc 68 PID 4832 wrote to memory of 2904 4832 cjerwcc 68 PID 4832 wrote to memory of 2904 4832 cjerwcc 68 PID 4832 wrote to memory of 2904 4832 cjerwcc 68 PID 4832 wrote to memory of 2904 4832 cjerwcc 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\33dd4c2ce64fc38b0e15b3ab7cc362faeec2d3c0b5a26c72f9b7887e4f1e6b6c.exe"C:\Users\Admin\AppData\Local\Temp\33dd4c2ce64fc38b0e15b3ab7cc362faeec2d3c0b5a26c72f9b7887e4f1e6b6c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\33dd4c2ce64fc38b0e15b3ab7cc362faeec2d3c0b5a26c72f9b7887e4f1e6b6c.exe"C:\Users\Admin\AppData\Local\Temp\33dd4c2ce64fc38b0e15b3ab7cc362faeec2d3c0b5a26c72f9b7887e4f1e6b6c.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3004
-
-
C:\Users\Admin\AppData\Roaming\cjerwccC:\Users\Admin\AppData\Roaming\cjerwcc1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Roaming\cjerwccC:\Users\Admin\AppData\Roaming\cjerwcc2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2904
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
301KB
MD50ca249312473fc1bd15cc25f2322c9b9
SHA1ea1c8ea5d3982b3050199312f9923c516acdb35f
SHA25633dd4c2ce64fc38b0e15b3ab7cc362faeec2d3c0b5a26c72f9b7887e4f1e6b6c
SHA51232ab0d7d28171e8040e9d1a90ee45c0b568eae579882ef4dab485c2aa2e5be8f28d29d2edf87989feec3a119cbde603999667093eea71f9fe78c189cd71b8012
-
Filesize
301KB
MD50ca249312473fc1bd15cc25f2322c9b9
SHA1ea1c8ea5d3982b3050199312f9923c516acdb35f
SHA25633dd4c2ce64fc38b0e15b3ab7cc362faeec2d3c0b5a26c72f9b7887e4f1e6b6c
SHA51232ab0d7d28171e8040e9d1a90ee45c0b568eae579882ef4dab485c2aa2e5be8f28d29d2edf87989feec3a119cbde603999667093eea71f9fe78c189cd71b8012
-
Filesize
301KB
MD50ca249312473fc1bd15cc25f2322c9b9
SHA1ea1c8ea5d3982b3050199312f9923c516acdb35f
SHA25633dd4c2ce64fc38b0e15b3ab7cc362faeec2d3c0b5a26c72f9b7887e4f1e6b6c
SHA51232ab0d7d28171e8040e9d1a90ee45c0b568eae579882ef4dab485c2aa2e5be8f28d29d2edf87989feec3a119cbde603999667093eea71f9fe78c189cd71b8012