Analysis
-
max time kernel
150s -
max time network
62s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
15-10-2022 14:58
Static task
static1
Behavioral task
behavioral1
Sample
db7ebed9bebb7b6c2518444fdd81d167cf296e8e9676455e09586b08c04f9c2f.exe
Resource
win10-20220812-en
General
-
Target
db7ebed9bebb7b6c2518444fdd81d167cf296e8e9676455e09586b08c04f9c2f.exe
-
Size
214KB
-
MD5
97fe1accb9d7fe5e6e434d116934b173
-
SHA1
2a63de161c4efc33619e64072006377b63b2fa34
-
SHA256
db7ebed9bebb7b6c2518444fdd81d167cf296e8e9676455e09586b08c04f9c2f
-
SHA512
e79dbfee55623db3a3bb605f21214540e281c696776aff66caafddd0e038096fc05c6ec8de8f0e0ef5b6e5b298c7483bb8d54ad063dafac4510e1d935b96c53c
-
SSDEEP
3072:rRQXpkIWLmFOag5k4RRl5EJYugG/Z+7bATjwdOCDQo0KEkWxN0f:1EILmF34L+ljwQCEo0LkWxs
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/2164-148-0x0000000002020000-0x0000000002029000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 1 IoCs
pid Process 4476 rtbdatv -
Deletes itself 1 IoCs
pid Process 2428 Process not Found -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rtbdatv Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI db7ebed9bebb7b6c2518444fdd81d167cf296e8e9676455e09586b08c04f9c2f.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI db7ebed9bebb7b6c2518444fdd81d167cf296e8e9676455e09586b08c04f9c2f.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI db7ebed9bebb7b6c2518444fdd81d167cf296e8e9676455e09586b08c04f9c2f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rtbdatv Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rtbdatv -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2164 db7ebed9bebb7b6c2518444fdd81d167cf296e8e9676455e09586b08c04f9c2f.exe 2164 db7ebed9bebb7b6c2518444fdd81d167cf296e8e9676455e09586b08c04f9c2f.exe 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found 2428 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2428 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2164 db7ebed9bebb7b6c2518444fdd81d167cf296e8e9676455e09586b08c04f9c2f.exe 4476 rtbdatv
Processes
-
C:\Users\Admin\AppData\Local\Temp\db7ebed9bebb7b6c2518444fdd81d167cf296e8e9676455e09586b08c04f9c2f.exe"C:\Users\Admin\AppData\Local\Temp\db7ebed9bebb7b6c2518444fdd81d167cf296e8e9676455e09586b08c04f9c2f.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2164
-
C:\Users\Admin\AppData\Roaming\rtbdatvC:\Users\Admin\AppData\Roaming\rtbdatv1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4476
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214KB
MD597fe1accb9d7fe5e6e434d116934b173
SHA12a63de161c4efc33619e64072006377b63b2fa34
SHA256db7ebed9bebb7b6c2518444fdd81d167cf296e8e9676455e09586b08c04f9c2f
SHA512e79dbfee55623db3a3bb605f21214540e281c696776aff66caafddd0e038096fc05c6ec8de8f0e0ef5b6e5b298c7483bb8d54ad063dafac4510e1d935b96c53c
-
Filesize
214KB
MD597fe1accb9d7fe5e6e434d116934b173
SHA12a63de161c4efc33619e64072006377b63b2fa34
SHA256db7ebed9bebb7b6c2518444fdd81d167cf296e8e9676455e09586b08c04f9c2f
SHA512e79dbfee55623db3a3bb605f21214540e281c696776aff66caafddd0e038096fc05c6ec8de8f0e0ef5b6e5b298c7483bb8d54ad063dafac4510e1d935b96c53c