Analysis
-
max time kernel
151s -
max time network
70s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
01/11/2022, 16:33
Static task
static1
Behavioral task
behavioral1
Sample
f6d1f211301156bfc4769e39ba62c6aae315edb6d125c21020407cd73b1c680f.exe
Resource
win10-20220812-en
General
-
Target
f6d1f211301156bfc4769e39ba62c6aae315edb6d125c21020407cd73b1c680f.exe
-
Size
319KB
-
MD5
80e10801b7c0b8cfaa4adc23b5ad3d96
-
SHA1
d8397de0aef683e01080420ce7dc7dd7abeb19c7
-
SHA256
f6d1f211301156bfc4769e39ba62c6aae315edb6d125c21020407cd73b1c680f
-
SHA512
34cea6b7978ee1cfbd1341841da3d3223ac5bc198ef37d95d413871a6bf7ccb3f6008b1b04c76274f67e04cafaf5f7f9b3f8493ed84bde433d15f5ef41c70b2f
-
SSDEEP
3072:z6cZQE8eoJreG5Cixdriv/g2JA01bOestanyQRKqwHusVggjcGkNIVqI8k:BZP87rLrinZA0oDtatRnwHJ7ITsqe
Malware Config
Signatures
-
Detects Smokeloader packer 5 IoCs
resource yara_rule behavioral1/memory/2628-139-0x00000000001D0000-0x00000000001D9000-memory.dmp family_smokeloader behavioral1/memory/4032-149-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4032-150-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/4032-160-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4032-182-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 2636 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2628 set thread context of 4032 2628 f6d1f211301156bfc4769e39ba62c6aae315edb6d125c21020407cd73b1c680f.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f6d1f211301156bfc4769e39ba62c6aae315edb6d125c21020407cd73b1c680f.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f6d1f211301156bfc4769e39ba62c6aae315edb6d125c21020407cd73b1c680f.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f6d1f211301156bfc4769e39ba62c6aae315edb6d125c21020407cd73b1c680f.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4032 f6d1f211301156bfc4769e39ba62c6aae315edb6d125c21020407cd73b1c680f.exe 4032 f6d1f211301156bfc4769e39ba62c6aae315edb6d125c21020407cd73b1c680f.exe 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found 2636 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2636 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4032 f6d1f211301156bfc4769e39ba62c6aae315edb6d125c21020407cd73b1c680f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2628 wrote to memory of 4032 2628 f6d1f211301156bfc4769e39ba62c6aae315edb6d125c21020407cd73b1c680f.exe 66 PID 2628 wrote to memory of 4032 2628 f6d1f211301156bfc4769e39ba62c6aae315edb6d125c21020407cd73b1c680f.exe 66 PID 2628 wrote to memory of 4032 2628 f6d1f211301156bfc4769e39ba62c6aae315edb6d125c21020407cd73b1c680f.exe 66 PID 2628 wrote to memory of 4032 2628 f6d1f211301156bfc4769e39ba62c6aae315edb6d125c21020407cd73b1c680f.exe 66 PID 2628 wrote to memory of 4032 2628 f6d1f211301156bfc4769e39ba62c6aae315edb6d125c21020407cd73b1c680f.exe 66 PID 2628 wrote to memory of 4032 2628 f6d1f211301156bfc4769e39ba62c6aae315edb6d125c21020407cd73b1c680f.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6d1f211301156bfc4769e39ba62c6aae315edb6d125c21020407cd73b1c680f.exe"C:\Users\Admin\AppData\Local\Temp\f6d1f211301156bfc4769e39ba62c6aae315edb6d125c21020407cd73b1c680f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\f6d1f211301156bfc4769e39ba62c6aae315edb6d125c21020407cd73b1c680f.exe"C:\Users\Admin\AppData\Local\Temp\f6d1f211301156bfc4769e39ba62c6aae315edb6d125c21020407cd73b1c680f.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4032
-