Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2022 08:57

General

  • Target

    66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267.exe

  • Size

    194KB

  • MD5

    60d26a6d319c4cbd702bb88ecba116e2

  • SHA1

    01dd3e6c8b6dcc1dd6583fcb0a8efa4fdcbe82a3

  • SHA256

    66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267

  • SHA512

    5b8818d162fcad7dbf659f6af3801e06f1fe4443223f93f2cd860475cdfbc9dc1dc6b58d0229671039001c09ec5c574189d534825fc96d86affe74d221d2c674

  • SSDEEP

    3072:YXXSjlOAqLbRLDA8s05z0/DVhtj/pVww1VVtaC0K/ER6LLCq:0alOAqLh7s5v7O4VVT0kERnq

Malware Config

Signatures

  • Detects Smokeloader packer 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of SetThreadContext 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267.exe
    "C:\Users\Admin\AppData\Local\Temp\66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3972
    • C:\Users\Admin\AppData\Local\Temp\66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267.exe
      "C:\Users\Admin\AppData\Local\Temp\66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:4656

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2056-172-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-190-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-141-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-142-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-139-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-205-0x0000000002330000-0x0000000002340000-memory.dmp

    Filesize

    64KB

  • memory/2056-204-0x0000000002330000-0x0000000002340000-memory.dmp

    Filesize

    64KB

  • memory/2056-143-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-144-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-145-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-147-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-146-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-148-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-149-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-150-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-151-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-152-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-153-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-154-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-155-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-156-0x0000000002AB0000-0x0000000002AC0000-memory.dmp

    Filesize

    64KB

  • memory/2056-157-0x0000000000A70000-0x0000000000A80000-memory.dmp

    Filesize

    64KB

  • memory/2056-158-0x0000000000A70000-0x0000000000A80000-memory.dmp

    Filesize

    64KB

  • memory/2056-159-0x0000000000A70000-0x0000000000A80000-memory.dmp

    Filesize

    64KB

  • memory/2056-160-0x0000000000A70000-0x0000000000A80000-memory.dmp

    Filesize

    64KB

  • memory/2056-161-0x0000000000A70000-0x0000000000A80000-memory.dmp

    Filesize

    64KB

  • memory/2056-162-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-163-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-164-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-165-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-166-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-167-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-168-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-169-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-170-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-171-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-173-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-203-0x0000000002470000-0x0000000002480000-memory.dmp

    Filesize

    64KB

  • memory/2056-140-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-175-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-176-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-177-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-178-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-179-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-180-0x00000000023A0000-0x00000000023B0000-memory.dmp

    Filesize

    64KB

  • memory/2056-181-0x00000000023A0000-0x00000000023B0000-memory.dmp

    Filesize

    64KB

  • memory/2056-182-0x0000000002390000-0x00000000023A0000-memory.dmp

    Filesize

    64KB

  • memory/2056-183-0x00000000023A0000-0x00000000023B0000-memory.dmp

    Filesize

    64KB

  • memory/2056-184-0x00000000023A0000-0x00000000023B0000-memory.dmp

    Filesize

    64KB

  • memory/2056-185-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-186-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-187-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-188-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-189-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-174-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-191-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-192-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-193-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-194-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-195-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-196-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-197-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-198-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-199-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-200-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-201-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/2056-202-0x00000000023A0000-0x00000000023B0000-memory.dmp

    Filesize

    64KB

  • memory/3972-136-0x0000000000648000-0x0000000000659000-memory.dmp

    Filesize

    68KB

  • memory/3972-133-0x0000000000590000-0x0000000000599000-memory.dmp

    Filesize

    36KB

  • memory/3972-132-0x0000000000648000-0x0000000000659000-memory.dmp

    Filesize

    68KB

  • memory/4656-135-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4656-137-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4656-138-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB