Analysis
-
max time kernel
150s -
max time network
63s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
25/10/2022, 17:41
Static task
static1
Behavioral task
behavioral1
Sample
8ac6cdf5bc860699cadafbd51d599b6a5525528172b19ab7a30c46ddae657c07.exe
Resource
win10-20220901-en
9 signatures
150 seconds
General
-
Target
8ac6cdf5bc860699cadafbd51d599b6a5525528172b19ab7a30c46ddae657c07.exe
-
Size
255KB
-
MD5
08d9393dcd344de4de3cc1756f6ae080
-
SHA1
6f9ac1c9ed9eb2d6834c69b365046c42afd0c8de
-
SHA256
8ac6cdf5bc860699cadafbd51d599b6a5525528172b19ab7a30c46ddae657c07
-
SHA512
41ec28fbb45bb1f8a4494464f0abf0b886beb375341783a4b55b01968d7f7fe04507e3a7b881c6cbd62cbed038a2a703b932ea86c8c4343cd2c50c6189a6b230
-
SSDEEP
6144:OyQBLe8rMT7A8VR79NV0L6orwrzN1cn73t:OnK8rMTs8f7AWzXc73t
Score
10/10
Malware Config
Signatures
-
Detects Smokeloader packer 5 IoCs
resource yara_rule behavioral1/memory/2916-140-0x0000000002E60000-0x0000000002E69000-memory.dmp family_smokeloader behavioral1/memory/3868-149-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3868-150-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/3868-164-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3868-182-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 2616 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2916 set thread context of 3868 2916 8ac6cdf5bc860699cadafbd51d599b6a5525528172b19ab7a30c46ddae657c07.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8ac6cdf5bc860699cadafbd51d599b6a5525528172b19ab7a30c46ddae657c07.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8ac6cdf5bc860699cadafbd51d599b6a5525528172b19ab7a30c46ddae657c07.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8ac6cdf5bc860699cadafbd51d599b6a5525528172b19ab7a30c46ddae657c07.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3868 8ac6cdf5bc860699cadafbd51d599b6a5525528172b19ab7a30c46ddae657c07.exe 3868 8ac6cdf5bc860699cadafbd51d599b6a5525528172b19ab7a30c46ddae657c07.exe 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found 2616 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2616 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3868 8ac6cdf5bc860699cadafbd51d599b6a5525528172b19ab7a30c46ddae657c07.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2916 wrote to memory of 3868 2916 8ac6cdf5bc860699cadafbd51d599b6a5525528172b19ab7a30c46ddae657c07.exe 66 PID 2916 wrote to memory of 3868 2916 8ac6cdf5bc860699cadafbd51d599b6a5525528172b19ab7a30c46ddae657c07.exe 66 PID 2916 wrote to memory of 3868 2916 8ac6cdf5bc860699cadafbd51d599b6a5525528172b19ab7a30c46ddae657c07.exe 66 PID 2916 wrote to memory of 3868 2916 8ac6cdf5bc860699cadafbd51d599b6a5525528172b19ab7a30c46ddae657c07.exe 66 PID 2916 wrote to memory of 3868 2916 8ac6cdf5bc860699cadafbd51d599b6a5525528172b19ab7a30c46ddae657c07.exe 66 PID 2916 wrote to memory of 3868 2916 8ac6cdf5bc860699cadafbd51d599b6a5525528172b19ab7a30c46ddae657c07.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ac6cdf5bc860699cadafbd51d599b6a5525528172b19ab7a30c46ddae657c07.exe"C:\Users\Admin\AppData\Local\Temp\8ac6cdf5bc860699cadafbd51d599b6a5525528172b19ab7a30c46ddae657c07.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\8ac6cdf5bc860699cadafbd51d599b6a5525528172b19ab7a30c46ddae657c07.exe"C:\Users\Admin\AppData\Local\Temp\8ac6cdf5bc860699cadafbd51d599b6a5525528172b19ab7a30c46ddae657c07.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3868
-