Analysis

  • max time kernel
    150s
  • max time network
    67s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25/10/2022, 06:18

General

  • Target

    e6e6756d136326a962178dd6a6103389dca970ef016735c45aa5e44bf9076b42.exe

  • Size

    229KB

  • MD5

    75b129efba766abef7bac9c9f93ff161

  • SHA1

    d3c0ba36f342adbc28b54eec26eb3a390825c2f0

  • SHA256

    e6e6756d136326a962178dd6a6103389dca970ef016735c45aa5e44bf9076b42

  • SHA512

    a9b855d346dce37c7c66c93a5e88c51707d0add846d76b74702cd6bb913188665ec6d72f336de8e889b3df0a3236757900637a20396bf7a4506ba6d6e8e9073a

  • SSDEEP

    3072:4XkkaLffcRoY5tP08EaEH5Y7XeKLwjpmSdhAl:MJaLMRocP0tGXvMg0hAl

Malware Config

Signatures

  • Detects Smokeloader packer 7 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6e6756d136326a962178dd6a6103389dca970ef016735c45aa5e44bf9076b42.exe
    "C:\Users\Admin\AppData\Local\Temp\e6e6756d136326a962178dd6a6103389dca970ef016735c45aa5e44bf9076b42.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4192
    • C:\Users\Admin\AppData\Local\Temp\e6e6756d136326a962178dd6a6103389dca970ef016735c45aa5e44bf9076b42.exe
      "C:\Users\Admin\AppData\Local\Temp\e6e6756d136326a962178dd6a6103389dca970ef016735c45aa5e44bf9076b42.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1476
  • C:\Users\Admin\AppData\Roaming\wirfvcw
    C:\Users\Admin\AppData\Roaming\wirfvcw
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3064
    • C:\Users\Admin\AppData\Roaming\wirfvcw
      C:\Users\Admin\AppData\Roaming\wirfvcw
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:1732

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\wirfvcw

    Filesize

    229KB

    MD5

    75b129efba766abef7bac9c9f93ff161

    SHA1

    d3c0ba36f342adbc28b54eec26eb3a390825c2f0

    SHA256

    e6e6756d136326a962178dd6a6103389dca970ef016735c45aa5e44bf9076b42

    SHA512

    a9b855d346dce37c7c66c93a5e88c51707d0add846d76b74702cd6bb913188665ec6d72f336de8e889b3df0a3236757900637a20396bf7a4506ba6d6e8e9073a

  • C:\Users\Admin\AppData\Roaming\wirfvcw

    Filesize

    229KB

    MD5

    75b129efba766abef7bac9c9f93ff161

    SHA1

    d3c0ba36f342adbc28b54eec26eb3a390825c2f0

    SHA256

    e6e6756d136326a962178dd6a6103389dca970ef016735c45aa5e44bf9076b42

    SHA512

    a9b855d346dce37c7c66c93a5e88c51707d0add846d76b74702cd6bb913188665ec6d72f336de8e889b3df0a3236757900637a20396bf7a4506ba6d6e8e9073a

  • C:\Users\Admin\AppData\Roaming\wirfvcw

    Filesize

    229KB

    MD5

    75b129efba766abef7bac9c9f93ff161

    SHA1

    d3c0ba36f342adbc28b54eec26eb3a390825c2f0

    SHA256

    e6e6756d136326a962178dd6a6103389dca970ef016735c45aa5e44bf9076b42

    SHA512

    a9b855d346dce37c7c66c93a5e88c51707d0add846d76b74702cd6bb913188665ec6d72f336de8e889b3df0a3236757900637a20396bf7a4506ba6d6e8e9073a

  • memory/1476-175-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-155-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-166-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-164-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1476-165-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-163-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-162-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-159-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-158-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-168-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-161-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-169-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-157-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-182-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1476-181-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-180-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-179-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-178-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-177-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-176-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-174-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-173-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-172-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-171-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-170-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-160-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-150-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1476-152-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-154-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-153-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-167-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1476-156-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/1732-246-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3064-184-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/3064-185-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/3064-186-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/3064-187-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/3064-188-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/3064-189-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/3064-190-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/3064-219-0x0000000002C80000-0x0000000002C89000-memory.dmp

    Filesize

    36KB

  • memory/4192-144-0x0000000002C30000-0x0000000002CDE000-memory.dmp

    Filesize

    696KB

  • memory/4192-149-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-132-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-148-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-147-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-141-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-142-0x0000000002D00000-0x0000000002E4A000-memory.dmp

    Filesize

    1.3MB

  • memory/4192-146-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-120-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-145-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-124-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-143-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-140-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-139-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-138-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-137-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-123-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-136-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-135-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-133-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-134-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-131-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-130-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-129-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-122-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-128-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-121-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-126-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-125-0x0000000077330000-0x00000000774BE000-memory.dmp

    Filesize

    1.6MB