Analysis
-
max time kernel
150s -
max time network
112s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
16/10/2022, 18:54
Static task
static1
Behavioral task
behavioral1
Sample
ee276cb28ae867d0225ada849dcd6ca8844e67cd95b28bb3eeb4dd89f8879790.exe
Resource
win10-20220812-en
9 signatures
150 seconds
General
-
Target
ee276cb28ae867d0225ada849dcd6ca8844e67cd95b28bb3eeb4dd89f8879790.exe
-
Size
219KB
-
MD5
74943a65af0692560119905d31403d0a
-
SHA1
8b65f7d4759c8a0db1440cd70bd444781e1128b8
-
SHA256
ee276cb28ae867d0225ada849dcd6ca8844e67cd95b28bb3eeb4dd89f8879790
-
SHA512
1278997bcead49f6260c2550f67bd61fd85a27eddeb8c0c094ca795886ea351799ee9d30d39e775e9115884212a0da2930ec8d7ab97ee8dc66704e01a4cd2501
-
SSDEEP
3072:YXpRKH9wLSCQ4o3M5yiID7ItbLreHqg/4fjS0KWEeVef:s6H9wLe3lDuIp4bS0xEd
Score
10/10
Malware Config
Signatures
-
Detects Smokeloader packer 5 IoCs
resource yara_rule behavioral1/memory/2300-145-0x00000000001E0000-0x00000000001E9000-memory.dmp family_smokeloader behavioral1/memory/376-149-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/376-150-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/376-162-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/376-182-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 2576 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2300 set thread context of 376 2300 ee276cb28ae867d0225ada849dcd6ca8844e67cd95b28bb3eeb4dd89f8879790.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ee276cb28ae867d0225ada849dcd6ca8844e67cd95b28bb3eeb4dd89f8879790.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ee276cb28ae867d0225ada849dcd6ca8844e67cd95b28bb3eeb4dd89f8879790.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ee276cb28ae867d0225ada849dcd6ca8844e67cd95b28bb3eeb4dd89f8879790.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 376 ee276cb28ae867d0225ada849dcd6ca8844e67cd95b28bb3eeb4dd89f8879790.exe 376 ee276cb28ae867d0225ada849dcd6ca8844e67cd95b28bb3eeb4dd89f8879790.exe 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2576 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 376 ee276cb28ae867d0225ada849dcd6ca8844e67cd95b28bb3eeb4dd89f8879790.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2300 wrote to memory of 376 2300 ee276cb28ae867d0225ada849dcd6ca8844e67cd95b28bb3eeb4dd89f8879790.exe 66 PID 2300 wrote to memory of 376 2300 ee276cb28ae867d0225ada849dcd6ca8844e67cd95b28bb3eeb4dd89f8879790.exe 66 PID 2300 wrote to memory of 376 2300 ee276cb28ae867d0225ada849dcd6ca8844e67cd95b28bb3eeb4dd89f8879790.exe 66 PID 2300 wrote to memory of 376 2300 ee276cb28ae867d0225ada849dcd6ca8844e67cd95b28bb3eeb4dd89f8879790.exe 66 PID 2300 wrote to memory of 376 2300 ee276cb28ae867d0225ada849dcd6ca8844e67cd95b28bb3eeb4dd89f8879790.exe 66 PID 2300 wrote to memory of 376 2300 ee276cb28ae867d0225ada849dcd6ca8844e67cd95b28bb3eeb4dd89f8879790.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee276cb28ae867d0225ada849dcd6ca8844e67cd95b28bb3eeb4dd89f8879790.exe"C:\Users\Admin\AppData\Local\Temp\ee276cb28ae867d0225ada849dcd6ca8844e67cd95b28bb3eeb4dd89f8879790.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\ee276cb28ae867d0225ada849dcd6ca8844e67cd95b28bb3eeb4dd89f8879790.exe"C:\Users\Admin\AppData\Local\Temp\ee276cb28ae867d0225ada849dcd6ca8844e67cd95b28bb3eeb4dd89f8879790.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:376
-