Analysis
-
max time kernel
20s -
max time network
87s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
29-10-2022 05:30
Static task
static1
Behavioral task
behavioral1
Sample
8ae685b47e90fb495ad242cdb489839a21cee0e98291d5bafe8744c2e35cd802.exe
Resource
win10-20220812-en
General
-
Target
8ae685b47e90fb495ad242cdb489839a21cee0e98291d5bafe8744c2e35cd802.exe
-
Size
260KB
-
MD5
bd7c5203e413c9fb00714a58b2117817
-
SHA1
26283ad1fc1fc3cc68a85e1f9ac5558828f18197
-
SHA256
8ae685b47e90fb495ad242cdb489839a21cee0e98291d5bafe8744c2e35cd802
-
SHA512
8446e9ab3a062b67fa264fd933c8dee93ebf5c2a0497b8a3e2caf7c3dbf7701c1602a69f6e7d544757c7717ff5b9c0f08209b8c52a7d8287dcc7b5e6e266509d
-
SSDEEP
3072:P7yxBqEgLpf7xEz5HCq+WYMSK5CGRJVJ6lKG9WrdWx9ks6NJfMWSm7myM/h3:OxBPgLZ7B54P5NRJVJ6RU0ks6XnSmay
Malware Config
Signatures
-
Detects Smokeloader packer 5 IoCs
resource yara_rule behavioral1/memory/4716-181-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4716-151-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/4716-150-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2692-147-0x0000000002D10000-0x0000000002D19000-memory.dmp family_smokeloader behavioral1/memory/4716-182-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2692 set thread context of 4716 2692 8ae685b47e90fb495ad242cdb489839a21cee0e98291d5bafe8744c2e35cd802.exe 53 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8ae685b47e90fb495ad242cdb489839a21cee0e98291d5bafe8744c2e35cd802.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8ae685b47e90fb495ad242cdb489839a21cee0e98291d5bafe8744c2e35cd802.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8ae685b47e90fb495ad242cdb489839a21cee0e98291d5bafe8744c2e35cd802.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4716 8ae685b47e90fb495ad242cdb489839a21cee0e98291d5bafe8744c2e35cd802.exe 4716 8ae685b47e90fb495ad242cdb489839a21cee0e98291d5bafe8744c2e35cd802.exe 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found 2328 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4716 8ae685b47e90fb495ad242cdb489839a21cee0e98291d5bafe8744c2e35cd802.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2692 wrote to memory of 4716 2692 8ae685b47e90fb495ad242cdb489839a21cee0e98291d5bafe8744c2e35cd802.exe 53 PID 2692 wrote to memory of 4716 2692 8ae685b47e90fb495ad242cdb489839a21cee0e98291d5bafe8744c2e35cd802.exe 53 PID 2692 wrote to memory of 4716 2692 8ae685b47e90fb495ad242cdb489839a21cee0e98291d5bafe8744c2e35cd802.exe 53 PID 2692 wrote to memory of 4716 2692 8ae685b47e90fb495ad242cdb489839a21cee0e98291d5bafe8744c2e35cd802.exe 53 PID 2692 wrote to memory of 4716 2692 8ae685b47e90fb495ad242cdb489839a21cee0e98291d5bafe8744c2e35cd802.exe 53 PID 2692 wrote to memory of 4716 2692 8ae685b47e90fb495ad242cdb489839a21cee0e98291d5bafe8744c2e35cd802.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ae685b47e90fb495ad242cdb489839a21cee0e98291d5bafe8744c2e35cd802.exe"C:\Users\Admin\AppData\Local\Temp\8ae685b47e90fb495ad242cdb489839a21cee0e98291d5bafe8744c2e35cd802.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\8ae685b47e90fb495ad242cdb489839a21cee0e98291d5bafe8744c2e35cd802.exe"C:\Users\Admin\AppData\Local\Temp\8ae685b47e90fb495ad242cdb489839a21cee0e98291d5bafe8744c2e35cd802.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4716
-