Analysis
-
max time kernel
150s -
max time network
66s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
19-10-2022 20:16
Static task
static1
Behavioral task
behavioral1
Sample
d559c37122df1e49c92d4feb41cfbfdba1b2879e809b825e47be39e98d2b9785.exe
Resource
win10-20220812-en
windows10-1703-x64
9 signatures
150 seconds
General
-
Target
d559c37122df1e49c92d4feb41cfbfdba1b2879e809b825e47be39e98d2b9785.exe
-
Size
229KB
-
MD5
a7cd11aa0d6e09767473182818e2f91a
-
SHA1
076c24fc71a472f81a38611e5d7b2586eae69425
-
SHA256
d559c37122df1e49c92d4feb41cfbfdba1b2879e809b825e47be39e98d2b9785
-
SHA512
005ed57595caf607310891e80163612889d1b47f5d87457a8d50c1db83259d9b1e49e49f11e124cef74bac4aba76c9a389f630308fd4ab680c6a103194383ef1
-
SSDEEP
3072:XK2aDBjqCV+4pR+X8L0qcCAPoWcsIxgDUwFuSKrnHNU1nzpxOrk74h:XKhDBGVML0AAPoxsGn7HNoag74
Score
10/10
Malware Config
Signatures
-
Detects Smokeloader packer 5 IoCs
resource yara_rule behavioral1/memory/4152-145-0x00000000001F0000-0x00000000001F9000-memory.dmp family_smokeloader behavioral1/memory/2108-150-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2108-151-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/2108-164-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2108-182-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 2896 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4152 set thread context of 2108 4152 d559c37122df1e49c92d4feb41cfbfdba1b2879e809b825e47be39e98d2b9785.exe 67 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d559c37122df1e49c92d4feb41cfbfdba1b2879e809b825e47be39e98d2b9785.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d559c37122df1e49c92d4feb41cfbfdba1b2879e809b825e47be39e98d2b9785.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d559c37122df1e49c92d4feb41cfbfdba1b2879e809b825e47be39e98d2b9785.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2108 d559c37122df1e49c92d4feb41cfbfdba1b2879e809b825e47be39e98d2b9785.exe 2108 d559c37122df1e49c92d4feb41cfbfdba1b2879e809b825e47be39e98d2b9785.exe 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2896 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2108 d559c37122df1e49c92d4feb41cfbfdba1b2879e809b825e47be39e98d2b9785.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4152 wrote to memory of 2108 4152 d559c37122df1e49c92d4feb41cfbfdba1b2879e809b825e47be39e98d2b9785.exe 67 PID 4152 wrote to memory of 2108 4152 d559c37122df1e49c92d4feb41cfbfdba1b2879e809b825e47be39e98d2b9785.exe 67 PID 4152 wrote to memory of 2108 4152 d559c37122df1e49c92d4feb41cfbfdba1b2879e809b825e47be39e98d2b9785.exe 67 PID 4152 wrote to memory of 2108 4152 d559c37122df1e49c92d4feb41cfbfdba1b2879e809b825e47be39e98d2b9785.exe 67 PID 4152 wrote to memory of 2108 4152 d559c37122df1e49c92d4feb41cfbfdba1b2879e809b825e47be39e98d2b9785.exe 67 PID 4152 wrote to memory of 2108 4152 d559c37122df1e49c92d4feb41cfbfdba1b2879e809b825e47be39e98d2b9785.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\d559c37122df1e49c92d4feb41cfbfdba1b2879e809b825e47be39e98d2b9785.exe"C:\Users\Admin\AppData\Local\Temp\d559c37122df1e49c92d4feb41cfbfdba1b2879e809b825e47be39e98d2b9785.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\d559c37122df1e49c92d4feb41cfbfdba1b2879e809b825e47be39e98d2b9785.exe"C:\Users\Admin\AppData\Local\Temp\d559c37122df1e49c92d4feb41cfbfdba1b2879e809b825e47be39e98d2b9785.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2108
-