Analysis
-
max time kernel
150s -
max time network
68s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
06/11/2022, 12:05
Static task
static1
Behavioral task
behavioral1
Sample
aa70786992be553b0e51e5bc98c1ad2d60b3c99bd1e16493648593123a9cdc88.exe
Resource
win10-20220901-en
General
-
Target
aa70786992be553b0e51e5bc98c1ad2d60b3c99bd1e16493648593123a9cdc88.exe
-
Size
285KB
-
MD5
aa2c8fe55e1902026dd62ae5080685a8
-
SHA1
60be5aa666e26e9de0ee6dcbea45d0612e12f8c9
-
SHA256
aa70786992be553b0e51e5bc98c1ad2d60b3c99bd1e16493648593123a9cdc88
-
SHA512
8d6cd4e4734d59bc51a3a786831c9fceae9ceb7c2505ec8c04eb41e062d65ed09e55ad231fb61907ff6b5bd0efc1e6a5d3a83c2720f85b46b6778b8f8c214b78
-
SSDEEP
3072:KqZ5WYin2CHThT5bqhRjywexBkuKUNg8MgY3IMjK/Yl:7Vi5H9tIexBkuJNg8MpHW/Yl
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/4060-193-0x0000000000930000-0x0000000000939000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 1 IoCs
pid Process 4060 chescig -
Deletes itself 1 IoCs
pid Process 3064 Process not Found -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI aa70786992be553b0e51e5bc98c1ad2d60b3c99bd1e16493648593123a9cdc88.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI aa70786992be553b0e51e5bc98c1ad2d60b3c99bd1e16493648593123a9cdc88.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI aa70786992be553b0e51e5bc98c1ad2d60b3c99bd1e16493648593123a9cdc88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI chescig Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI chescig Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI chescig -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5012 aa70786992be553b0e51e5bc98c1ad2d60b3c99bd1e16493648593123a9cdc88.exe 5012 aa70786992be553b0e51e5bc98c1ad2d60b3c99bd1e16493648593123a9cdc88.exe 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3064 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5012 aa70786992be553b0e51e5bc98c1ad2d60b3c99bd1e16493648593123a9cdc88.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa70786992be553b0e51e5bc98c1ad2d60b3c99bd1e16493648593123a9cdc88.exe"C:\Users\Admin\AppData\Local\Temp\aa70786992be553b0e51e5bc98c1ad2d60b3c99bd1e16493648593123a9cdc88.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5012
-
C:\Users\Admin\AppData\Roaming\chescigC:\Users\Admin\AppData\Roaming\chescig1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4060
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD5aa2c8fe55e1902026dd62ae5080685a8
SHA160be5aa666e26e9de0ee6dcbea45d0612e12f8c9
SHA256aa70786992be553b0e51e5bc98c1ad2d60b3c99bd1e16493648593123a9cdc88
SHA5128d6cd4e4734d59bc51a3a786831c9fceae9ceb7c2505ec8c04eb41e062d65ed09e55ad231fb61907ff6b5bd0efc1e6a5d3a83c2720f85b46b6778b8f8c214b78
-
Filesize
285KB
MD5aa2c8fe55e1902026dd62ae5080685a8
SHA160be5aa666e26e9de0ee6dcbea45d0612e12f8c9
SHA256aa70786992be553b0e51e5bc98c1ad2d60b3c99bd1e16493648593123a9cdc88
SHA5128d6cd4e4734d59bc51a3a786831c9fceae9ceb7c2505ec8c04eb41e062d65ed09e55ad231fb61907ff6b5bd0efc1e6a5d3a83c2720f85b46b6778b8f8c214b78