Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
26/10/2022, 23:38
Static task
static1
Behavioral task
behavioral1
Sample
e785cb1ed3438760c311b66ebe467822838808ea8f6ff07c9a4fcc708b31b74d.exe
Resource
win10-20220812-en
General
-
Target
e785cb1ed3438760c311b66ebe467822838808ea8f6ff07c9a4fcc708b31b74d.exe
-
Size
218KB
-
MD5
ee84a9e9cc6ff7f200a85849c38b9db8
-
SHA1
56cd517e6e9262269f4187729ac5b00b5e1ea5ef
-
SHA256
e785cb1ed3438760c311b66ebe467822838808ea8f6ff07c9a4fcc708b31b74d
-
SHA512
7b811e3e39b98a340b28ae99cc632c3c989b549a718ca1eb2f9a4974f385a7973e546ad39b4f454bbc338de645c0dc53e0759bacc4f597c78a84766ff735f506
-
SSDEEP
3072:n4xJ/pwy90JAOULLoL43JXdbBtRK67xvf55xfSomA5ZKDkAGEv5/HRiC9J5nrx:4x/79fLJDRKUxvKkidRiC9J5r
Malware Config
Signatures
-
Detects Smokeloader packer 8 IoCs
resource yara_rule behavioral1/memory/4996-144-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4996-145-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/4996-163-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4996-176-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/1812-208-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/4260-214-0x00000000001E0000-0x00000000001E9000-memory.dmp family_smokeloader behavioral1/memory/1812-240-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/1812-241-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 4260 cajesbg 1812 cajesbg -
Deletes itself 1 IoCs
pid Process 3144 Process not Found -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2896 set thread context of 4996 2896 e785cb1ed3438760c311b66ebe467822838808ea8f6ff07c9a4fcc708b31b74d.exe 67 PID 4260 set thread context of 1812 4260 cajesbg 69 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cajesbg Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cajesbg Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cajesbg Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e785cb1ed3438760c311b66ebe467822838808ea8f6ff07c9a4fcc708b31b74d.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e785cb1ed3438760c311b66ebe467822838808ea8f6ff07c9a4fcc708b31b74d.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e785cb1ed3438760c311b66ebe467822838808ea8f6ff07c9a4fcc708b31b74d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4996 e785cb1ed3438760c311b66ebe467822838808ea8f6ff07c9a4fcc708b31b74d.exe 4996 e785cb1ed3438760c311b66ebe467822838808ea8f6ff07c9a4fcc708b31b74d.exe 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3144 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4996 e785cb1ed3438760c311b66ebe467822838808ea8f6ff07c9a4fcc708b31b74d.exe 1812 cajesbg -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3144 Process not Found Token: SeCreatePagefilePrivilege 3144 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2896 wrote to memory of 4996 2896 e785cb1ed3438760c311b66ebe467822838808ea8f6ff07c9a4fcc708b31b74d.exe 67 PID 2896 wrote to memory of 4996 2896 e785cb1ed3438760c311b66ebe467822838808ea8f6ff07c9a4fcc708b31b74d.exe 67 PID 2896 wrote to memory of 4996 2896 e785cb1ed3438760c311b66ebe467822838808ea8f6ff07c9a4fcc708b31b74d.exe 67 PID 2896 wrote to memory of 4996 2896 e785cb1ed3438760c311b66ebe467822838808ea8f6ff07c9a4fcc708b31b74d.exe 67 PID 2896 wrote to memory of 4996 2896 e785cb1ed3438760c311b66ebe467822838808ea8f6ff07c9a4fcc708b31b74d.exe 67 PID 2896 wrote to memory of 4996 2896 e785cb1ed3438760c311b66ebe467822838808ea8f6ff07c9a4fcc708b31b74d.exe 67 PID 4260 wrote to memory of 1812 4260 cajesbg 69 PID 4260 wrote to memory of 1812 4260 cajesbg 69 PID 4260 wrote to memory of 1812 4260 cajesbg 69 PID 4260 wrote to memory of 1812 4260 cajesbg 69 PID 4260 wrote to memory of 1812 4260 cajesbg 69 PID 4260 wrote to memory of 1812 4260 cajesbg 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\e785cb1ed3438760c311b66ebe467822838808ea8f6ff07c9a4fcc708b31b74d.exe"C:\Users\Admin\AppData\Local\Temp\e785cb1ed3438760c311b66ebe467822838808ea8f6ff07c9a4fcc708b31b74d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\e785cb1ed3438760c311b66ebe467822838808ea8f6ff07c9a4fcc708b31b74d.exe"C:\Users\Admin\AppData\Local\Temp\e785cb1ed3438760c311b66ebe467822838808ea8f6ff07c9a4fcc708b31b74d.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4996
-
-
C:\Users\Admin\AppData\Roaming\cajesbgC:\Users\Admin\AppData\Roaming\cajesbg1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Roaming\cajesbgC:\Users\Admin\AppData\Roaming\cajesbg2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1812
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218KB
MD5ee84a9e9cc6ff7f200a85849c38b9db8
SHA156cd517e6e9262269f4187729ac5b00b5e1ea5ef
SHA256e785cb1ed3438760c311b66ebe467822838808ea8f6ff07c9a4fcc708b31b74d
SHA5127b811e3e39b98a340b28ae99cc632c3c989b549a718ca1eb2f9a4974f385a7973e546ad39b4f454bbc338de645c0dc53e0759bacc4f597c78a84766ff735f506
-
Filesize
218KB
MD5ee84a9e9cc6ff7f200a85849c38b9db8
SHA156cd517e6e9262269f4187729ac5b00b5e1ea5ef
SHA256e785cb1ed3438760c311b66ebe467822838808ea8f6ff07c9a4fcc708b31b74d
SHA5127b811e3e39b98a340b28ae99cc632c3c989b549a718ca1eb2f9a4974f385a7973e546ad39b4f454bbc338de645c0dc53e0759bacc4f597c78a84766ff735f506
-
Filesize
218KB
MD5ee84a9e9cc6ff7f200a85849c38b9db8
SHA156cd517e6e9262269f4187729ac5b00b5e1ea5ef
SHA256e785cb1ed3438760c311b66ebe467822838808ea8f6ff07c9a4fcc708b31b74d
SHA5127b811e3e39b98a340b28ae99cc632c3c989b549a718ca1eb2f9a4974f385a7973e546ad39b4f454bbc338de645c0dc53e0759bacc4f597c78a84766ff735f506