Analysis
-
max time kernel
152s -
max time network
74s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
01-11-2022 18:58
Static task
static1
Behavioral task
behavioral1
Sample
59882f450d336a3e79d445838b533a8439aa9f2a826ceaf5d5b0a30b52630037.exe
Resource
win10-20220812-en
General
-
Target
59882f450d336a3e79d445838b533a8439aa9f2a826ceaf5d5b0a30b52630037.exe
-
Size
340KB
-
MD5
367dd41dcc8e9cc5fc4fcfbc7789928a
-
SHA1
b0404a85759b3137b6e1964bbf086d3638820ea0
-
SHA256
59882f450d336a3e79d445838b533a8439aa9f2a826ceaf5d5b0a30b52630037
-
SHA512
f7f4b3cf095ab2aa3ba6f218de9d3151e6a8637abc7ab41c6daf31b0c0ffa6c0839e241091f7a6be485dc87b4a90b22b868c359acd3c52f28db5edf50ac059d8
-
SSDEEP
6144:/nuljzpf0vFNR2QrqVYmf+Fe/pLX07ITsq:/nqzpf0vjrjEw7
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/3540-139-0x0000000002CB0000-0x0000000002CB9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 1 IoCs
pid Process 1568 cvuicdr -
Deletes itself 1 IoCs
pid Process 2112 Process not Found -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 59882f450d336a3e79d445838b533a8439aa9f2a826ceaf5d5b0a30b52630037.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 59882f450d336a3e79d445838b533a8439aa9f2a826ceaf5d5b0a30b52630037.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 59882f450d336a3e79d445838b533a8439aa9f2a826ceaf5d5b0a30b52630037.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cvuicdr Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cvuicdr Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cvuicdr -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3540 59882f450d336a3e79d445838b533a8439aa9f2a826ceaf5d5b0a30b52630037.exe 3540 59882f450d336a3e79d445838b533a8439aa9f2a826ceaf5d5b0a30b52630037.exe 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2112 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3540 59882f450d336a3e79d445838b533a8439aa9f2a826ceaf5d5b0a30b52630037.exe 1568 cvuicdr
Processes
-
C:\Users\Admin\AppData\Local\Temp\59882f450d336a3e79d445838b533a8439aa9f2a826ceaf5d5b0a30b52630037.exe"C:\Users\Admin\AppData\Local\Temp\59882f450d336a3e79d445838b533a8439aa9f2a826ceaf5d5b0a30b52630037.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3540
-
C:\Users\Admin\AppData\Roaming\cvuicdrC:\Users\Admin\AppData\Roaming\cvuicdr1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1568
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340KB
MD5367dd41dcc8e9cc5fc4fcfbc7789928a
SHA1b0404a85759b3137b6e1964bbf086d3638820ea0
SHA25659882f450d336a3e79d445838b533a8439aa9f2a826ceaf5d5b0a30b52630037
SHA512f7f4b3cf095ab2aa3ba6f218de9d3151e6a8637abc7ab41c6daf31b0c0ffa6c0839e241091f7a6be485dc87b4a90b22b868c359acd3c52f28db5edf50ac059d8
-
Filesize
340KB
MD5367dd41dcc8e9cc5fc4fcfbc7789928a
SHA1b0404a85759b3137b6e1964bbf086d3638820ea0
SHA25659882f450d336a3e79d445838b533a8439aa9f2a826ceaf5d5b0a30b52630037
SHA512f7f4b3cf095ab2aa3ba6f218de9d3151e6a8637abc7ab41c6daf31b0c0ffa6c0839e241091f7a6be485dc87b4a90b22b868c359acd3c52f28db5edf50ac059d8