Analysis
-
max time kernel
183s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
24a8afd4826ccb99011101bb7610c99c29d82994765cc02647ce0ca1e280bfd7.exe
Resource
win10v2004-20220812-en
General
-
Target
24a8afd4826ccb99011101bb7610c99c29d82994765cc02647ce0ca1e280bfd7.exe
-
Size
194KB
-
MD5
2af7b8264bd70de210e6e2b05adad0f9
-
SHA1
e31a656d392ac70916570a675de98c040a20d90f
-
SHA256
24a8afd4826ccb99011101bb7610c99c29d82994765cc02647ce0ca1e280bfd7
-
SHA512
abdade54943c5a76f6c552b634b9dd6e17546f6d283588941c3a0a35a59eeb443701ee173341d5fbcbd02d9a80ca530450819c268d82669b2a36987192fb135c
-
SSDEEP
3072:aXS4kmLk10FsY58NpJDqmnXFgjHxaWfe20KJAQ1+:6tkmLBu1fJDtn1l80RQ1
Malware Config
Signatures
-
Detects Smokeloader packer 2 IoCs
resource yara_rule behavioral1/memory/5080-133-0x0000000002030000-0x0000000002039000-memory.dmp family_smokeloader behavioral1/memory/5080-136-0x0000000002030000-0x0000000002039000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 4344 8102.exe 1200 B9F5.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 24a8afd4826ccb99011101bb7610c99c29d82994765cc02647ce0ca1e280bfd7.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 24a8afd4826ccb99011101bb7610c99c29d82994765cc02647ce0ca1e280bfd7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 24a8afd4826ccb99011101bb7610c99c29d82994765cc02647ce0ca1e280bfd7.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5080 24a8afd4826ccb99011101bb7610c99c29d82994765cc02647ce0ca1e280bfd7.exe 5080 24a8afd4826ccb99011101bb7610c99c29d82994765cc02647ce0ca1e280bfd7.exe 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2484 Process not Found -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 5080 24a8afd4826ccb99011101bb7610c99c29d82994765cc02647ce0ca1e280bfd7.exe 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2484 wrote to memory of 4344 2484 Process not Found 81 PID 2484 wrote to memory of 4344 2484 Process not Found 81 PID 2484 wrote to memory of 4344 2484 Process not Found 81 PID 2484 wrote to memory of 1200 2484 Process not Found 84 PID 2484 wrote to memory of 1200 2484 Process not Found 84 PID 2484 wrote to memory of 1200 2484 Process not Found 84 PID 2484 wrote to memory of 4272 2484 Process not Found 87 PID 2484 wrote to memory of 4272 2484 Process not Found 87 PID 2484 wrote to memory of 4272 2484 Process not Found 87 PID 2484 wrote to memory of 4272 2484 Process not Found 87 PID 2484 wrote to memory of 3736 2484 Process not Found 90 PID 2484 wrote to memory of 3736 2484 Process not Found 90 PID 2484 wrote to memory of 3736 2484 Process not Found 90 PID 2484 wrote to memory of 4288 2484 Process not Found 91 PID 2484 wrote to memory of 4288 2484 Process not Found 91 PID 2484 wrote to memory of 4288 2484 Process not Found 91 PID 2484 wrote to memory of 4288 2484 Process not Found 91 PID 2484 wrote to memory of 1824 2484 Process not Found 92 PID 2484 wrote to memory of 1824 2484 Process not Found 92 PID 2484 wrote to memory of 1824 2484 Process not Found 92 PID 2484 wrote to memory of 4044 2484 Process not Found 93 PID 2484 wrote to memory of 4044 2484 Process not Found 93 PID 2484 wrote to memory of 4044 2484 Process not Found 93 PID 2484 wrote to memory of 4044 2484 Process not Found 93 PID 2484 wrote to memory of 3236 2484 Process not Found 94 PID 2484 wrote to memory of 3236 2484 Process not Found 94 PID 2484 wrote to memory of 3236 2484 Process not Found 94 PID 2484 wrote to memory of 3236 2484 Process not Found 94 PID 2484 wrote to memory of 3904 2484 Process not Found 95 PID 2484 wrote to memory of 3904 2484 Process not Found 95 PID 2484 wrote to memory of 3904 2484 Process not Found 95 PID 2484 wrote to memory of 3904 2484 Process not Found 95 PID 2484 wrote to memory of 996 2484 Process not Found 96 PID 2484 wrote to memory of 996 2484 Process not Found 96 PID 2484 wrote to memory of 996 2484 Process not Found 96 PID 2484 wrote to memory of 4936 2484 Process not Found 97 PID 2484 wrote to memory of 4936 2484 Process not Found 97 PID 2484 wrote to memory of 4936 2484 Process not Found 97 PID 2484 wrote to memory of 4936 2484 Process not Found 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\24a8afd4826ccb99011101bb7610c99c29d82994765cc02647ce0ca1e280bfd7.exe"C:\Users\Admin\AppData\Local\Temp\24a8afd4826ccb99011101bb7610c99c29d82994765cc02647ce0ca1e280bfd7.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5080
-
C:\Users\Admin\AppData\Local\Temp\8102.exeC:\Users\Admin\AppData\Local\Temp\8102.exe1⤵
- Executes dropped EXE
PID:4344
-
C:\Users\Admin\AppData\Local\Temp\B9F5.exeC:\Users\Admin\AppData\Local\Temp\B9F5.exe1⤵
- Executes dropped EXE
PID:1200
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4272
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3736
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4288
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1824
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4044
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3236
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3904
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:996
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
361KB
MD5c8588b731592e0b048a0b181d09fe020
SHA1c8ac824e74968b7e3cfc88890c1948c1f27cf298
SHA256d10cb807f66c43ba55138c002a4d5a7203aa6e277d20165c4be570111c10a930
SHA512042a181ad2dba229102e912eedb9f58aebdb6615a3b5314778e376e1fa3349bd5aa6c0657c7fdf5e174d7f5f625154b97160291a7ff5a280255e790108945922
-
Filesize
361KB
MD5c8588b731592e0b048a0b181d09fe020
SHA1c8ac824e74968b7e3cfc88890c1948c1f27cf298
SHA256d10cb807f66c43ba55138c002a4d5a7203aa6e277d20165c4be570111c10a930
SHA512042a181ad2dba229102e912eedb9f58aebdb6615a3b5314778e376e1fa3349bd5aa6c0657c7fdf5e174d7f5f625154b97160291a7ff5a280255e790108945922
-
Filesize
361KB
MD597363c84a5234bceaa765609a99ee8b7
SHA1f02a8a68fd1414246073f685c232b895798a6f59
SHA2568fd79179f0e8e72f7bbeff11d2bbcc42abed9baa1e48f6095580c48f2430b41f
SHA512a752fa8019a5f74ae93de70578b26bda6680879a2294836f2e4e3184cdd884e7663f6b37615b4b96552e3cd414c544a8e221c9b3519dd2ff46211a0c74a3b121
-
Filesize
361KB
MD597363c84a5234bceaa765609a99ee8b7
SHA1f02a8a68fd1414246073f685c232b895798a6f59
SHA2568fd79179f0e8e72f7bbeff11d2bbcc42abed9baa1e48f6095580c48f2430b41f
SHA512a752fa8019a5f74ae93de70578b26bda6680879a2294836f2e4e3184cdd884e7663f6b37615b4b96552e3cd414c544a8e221c9b3519dd2ff46211a0c74a3b121