Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 08:57
Static task
static1
Behavioral task
behavioral1
Sample
66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267.exe
Resource
win10v2004-20220901-en
windows10-2004-x64
9 signatures
150 seconds
General
-
Target
66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267.exe
-
Size
194KB
-
MD5
60d26a6d319c4cbd702bb88ecba116e2
-
SHA1
01dd3e6c8b6dcc1dd6583fcb0a8efa4fdcbe82a3
-
SHA256
66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267
-
SHA512
5b8818d162fcad7dbf659f6af3801e06f1fe4443223f93f2cd860475cdfbc9dc1dc6b58d0229671039001c09ec5c574189d534825fc96d86affe74d221d2c674
-
SSDEEP
3072:YXXSjlOAqLbRLDA8s05z0/DVhtj/pVww1VVtaC0K/ER6LLCq:0alOAqLh7s5v7O4VVT0kERnq
Score
10/10
Malware Config
Signatures
-
Detects Smokeloader packer 4 IoCs
resource yara_rule behavioral1/memory/3972-133-0x0000000000590000-0x0000000000599000-memory.dmp family_smokeloader behavioral1/memory/4656-135-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4656-137-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4656-138-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3972 set thread context of 4656 3972 66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267.exe 85 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4656 66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267.exe 4656 66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267.exe 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2056 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4656 66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2056 Process not Found Token: SeCreatePagefilePrivilege 2056 Process not Found Token: SeShutdownPrivilege 2056 Process not Found Token: SeCreatePagefilePrivilege 2056 Process not Found Token: SeShutdownPrivilege 2056 Process not Found Token: SeCreatePagefilePrivilege 2056 Process not Found Token: SeShutdownPrivilege 2056 Process not Found Token: SeCreatePagefilePrivilege 2056 Process not Found Token: SeShutdownPrivilege 2056 Process not Found Token: SeCreatePagefilePrivilege 2056 Process not Found Token: SeShutdownPrivilege 2056 Process not Found Token: SeCreatePagefilePrivilege 2056 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3972 wrote to memory of 4656 3972 66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267.exe 85 PID 3972 wrote to memory of 4656 3972 66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267.exe 85 PID 3972 wrote to memory of 4656 3972 66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267.exe 85 PID 3972 wrote to memory of 4656 3972 66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267.exe 85 PID 3972 wrote to memory of 4656 3972 66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267.exe 85 PID 3972 wrote to memory of 4656 3972 66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267.exe"C:\Users\Admin\AppData\Local\Temp\66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267.exe"C:\Users\Admin\AppData\Local\Temp\66911f05d7a486176010406a1a4ce247f830983b9deb85a8ce8f574a8f3f2267.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4656
-