Analysis
-
max time kernel
180s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 16:55
Static task
static1
Behavioral task
behavioral1
Sample
2676374e6bf6ba1f7fe417c99474fc917ca218447f7ac59a8d2fc8de1a600a78.exe
Resource
win10v2004-20220812-en
General
-
Target
2676374e6bf6ba1f7fe417c99474fc917ca218447f7ac59a8d2fc8de1a600a78.exe
-
Size
285KB
-
MD5
0550b85844aa024fbbeead0e481d6a4e
-
SHA1
aa4bd72b5f1ac3deeb01d778611ff9175a4d5e3b
-
SHA256
2676374e6bf6ba1f7fe417c99474fc917ca218447f7ac59a8d2fc8de1a600a78
-
SHA512
1c9f766bb47f065a233ea63e56673c552553a5c0e3bccbf24041d990bba4d9232c50f21354318e11f25d7f75a70b0a752c6453d3d9a66b6e00e4a8fc4b0e51af
-
SSDEEP
3072:4vzT6rUfvb/LC0H6B5ZpVes+JcSJr+ZlL7TmS1d3vP6apldnhM/h3:NrUfvb/LC0H6FUJlG7JDvPPpldh
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/4968-133-0x00000000001F0000-0x00000000001F9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2376 4793.exe 3296 4793.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 4793.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
pid pid_target Process procid_target 3864 2376 WerFault.exe 90 3608 2376 WerFault.exe 90 2912 2376 WerFault.exe 90 3620 2376 WerFault.exe 90 2064 2376 WerFault.exe 90 1780 2376 WerFault.exe 90 4276 2376 WerFault.exe 90 60 2376 WerFault.exe 90 424 3296 WerFault.exe 106 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2676374e6bf6ba1f7fe417c99474fc917ca218447f7ac59a8d2fc8de1a600a78.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2676374e6bf6ba1f7fe417c99474fc917ca218447f7ac59a8d2fc8de1a600a78.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2676374e6bf6ba1f7fe417c99474fc917ca218447f7ac59a8d2fc8de1a600a78.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4968 2676374e6bf6ba1f7fe417c99474fc917ca218447f7ac59a8d2fc8de1a600a78.exe 4968 2676374e6bf6ba1f7fe417c99474fc917ca218447f7ac59a8d2fc8de1a600a78.exe 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found 780 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 780 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4968 2676374e6bf6ba1f7fe417c99474fc917ca218447f7ac59a8d2fc8de1a600a78.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 780 Process not Found Token: SeCreatePagefilePrivilege 780 Process not Found Token: SeShutdownPrivilege 780 Process not Found Token: SeCreatePagefilePrivilege 780 Process not Found Token: SeShutdownPrivilege 780 Process not Found Token: SeCreatePagefilePrivilege 780 Process not Found Token: SeShutdownPrivilege 780 Process not Found Token: SeCreatePagefilePrivilege 780 Process not Found Token: SeShutdownPrivilege 780 Process not Found Token: SeCreatePagefilePrivilege 780 Process not Found Token: SeShutdownPrivilege 780 Process not Found Token: SeCreatePagefilePrivilege 780 Process not Found Token: SeShutdownPrivilege 780 Process not Found Token: SeCreatePagefilePrivilege 780 Process not Found Token: SeShutdownPrivilege 780 Process not Found Token: SeCreatePagefilePrivilege 780 Process not Found -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 780 wrote to memory of 2376 780 Process not Found 90 PID 780 wrote to memory of 2376 780 Process not Found 90 PID 780 wrote to memory of 2376 780 Process not Found 90 PID 2376 wrote to memory of 3296 2376 4793.exe 106 PID 2376 wrote to memory of 3296 2376 4793.exe 106 PID 2376 wrote to memory of 3296 2376 4793.exe 106 PID 2376 wrote to memory of 5044 2376 4793.exe 111 PID 2376 wrote to memory of 5044 2376 4793.exe 111 PID 2376 wrote to memory of 5044 2376 4793.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2676374e6bf6ba1f7fe417c99474fc917ca218447f7ac59a8d2fc8de1a600a78.exe"C:\Users\Admin\AppData\Local\Temp\2676374e6bf6ba1f7fe417c99474fc917ca218447f7ac59a8d2fc8de1a600a78.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4968
-
C:\Users\Admin\AppData\Local\Temp\4793.exeC:\Users\Admin\AppData\Local\Temp\4793.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 6282⤵
- Program crash
PID:3864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 9122⤵
- Program crash
PID:3608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 9802⤵
- Program crash
PID:2912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 11042⤵
- Program crash
PID:3620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 9602⤵
- Program crash
PID:2064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 11322⤵
- Program crash
PID:1780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 11202⤵
- Program crash
PID:4276
-
-
C:\Users\Admin\AppData\Local\Temp\4793.exe"C:\Users\Admin\AppData\Local\Temp\4793.exe"2⤵
- Executes dropped EXE
PID:3296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3296 -s 6003⤵
- Program crash
PID:424
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 10482⤵
- Program crash
PID:60
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Dydhshsoe.dll,start2⤵PID:5044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2376 -ip 23761⤵PID:1444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2376 -ip 23761⤵PID:1640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2376 -ip 23761⤵PID:1260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2376 -ip 23761⤵PID:4464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2376 -ip 23761⤵PID:4584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2376 -ip 23761⤵PID:1476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2376 -ip 23761⤵PID:5004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2376 -ip 23761⤵PID:4600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3296 -ip 32961⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2376 -ip 23761⤵PID:4548
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.1MB
MD5660c791a048da7a94aea15b2afd18f29
SHA1de2b82ae153902b79fb998f84c396f68fe8c3ab5
SHA256052cf058219159f00e4328a5537d2f399f110805647f2ae9d52f1b1cf9509932
SHA5121d947b6d93fd105dcf939fb2916fdf2f6105fc72dfbdde0d289c1d3ff400577a503377a8ba653b49ca977b0a04136042f5c5304372477d8e3817589298e06412
-
Filesize
6.1MB
MD5660c791a048da7a94aea15b2afd18f29
SHA1de2b82ae153902b79fb998f84c396f68fe8c3ab5
SHA256052cf058219159f00e4328a5537d2f399f110805647f2ae9d52f1b1cf9509932
SHA5121d947b6d93fd105dcf939fb2916fdf2f6105fc72dfbdde0d289c1d3ff400577a503377a8ba653b49ca977b0a04136042f5c5304372477d8e3817589298e06412
-
Filesize
6.1MB
MD5660c791a048da7a94aea15b2afd18f29
SHA1de2b82ae153902b79fb998f84c396f68fe8c3ab5
SHA256052cf058219159f00e4328a5537d2f399f110805647f2ae9d52f1b1cf9509932
SHA5121d947b6d93fd105dcf939fb2916fdf2f6105fc72dfbdde0d289c1d3ff400577a503377a8ba653b49ca977b0a04136042f5c5304372477d8e3817589298e06412