Analysis
-
max time kernel
209s -
max time network
214s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 10:56
Static task
static1
Behavioral task
behavioral1
Sample
65371eadc4901e9b09abd589f8a3825794e7660c99161ab97ec3b70314528a59.exe
Resource
win10v2004-20220812-en
General
-
Target
65371eadc4901e9b09abd589f8a3825794e7660c99161ab97ec3b70314528a59.exe
-
Size
213KB
-
MD5
e50ffc6e31bbcfe345fdbc8f13680964
-
SHA1
ff5ef3373971d87dbf57ccd08194e29864a3c80e
-
SHA256
65371eadc4901e9b09abd589f8a3825794e7660c99161ab97ec3b70314528a59
-
SHA512
bc3f5b9ebf9c3abf6be6199c42303ac18f5647e25581fb62be03b53e36648b5c64b2e42bac8c1d185354b9fb59cd21c2fbb06b36e7809ac63a1561ebe9bd89df
-
SSDEEP
3072:u7BNL+50DvPwhOSLKd6RusIjN5FDst32t5DZIJpQfc:ulO0PoLFRusIxDYmJspQk
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/1684-133-0x00000000007F0000-0x00000000007F9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2336 2B0E.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1520 2336 WerFault.exe 87 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 65371eadc4901e9b09abd589f8a3825794e7660c99161ab97ec3b70314528a59.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 65371eadc4901e9b09abd589f8a3825794e7660c99161ab97ec3b70314528a59.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 65371eadc4901e9b09abd589f8a3825794e7660c99161ab97ec3b70314528a59.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1684 65371eadc4901e9b09abd589f8a3825794e7660c99161ab97ec3b70314528a59.exe 1684 65371eadc4901e9b09abd589f8a3825794e7660c99161ab97ec3b70314528a59.exe 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found 2576 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2576 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1684 65371eadc4901e9b09abd589f8a3825794e7660c99161ab97ec3b70314528a59.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2576 wrote to memory of 2336 2576 Process not Found 87 PID 2576 wrote to memory of 2336 2576 Process not Found 87 PID 2576 wrote to memory of 2336 2576 Process not Found 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\65371eadc4901e9b09abd589f8a3825794e7660c99161ab97ec3b70314528a59.exe"C:\Users\Admin\AppData\Local\Temp\65371eadc4901e9b09abd589f8a3825794e7660c99161ab97ec3b70314528a59.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1684
-
C:\Users\Admin\AppData\Local\Temp\2B0E.exeC:\Users\Admin\AppData\Local\Temp\2B0E.exe1⤵
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2336 -s 5722⤵
- Program crash
PID:1520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2336 -ip 23361⤵PID:2020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.8MB
MD59a36695d174a4088cb9b8a1e5c93cf93
SHA1f18ca8c1f014506cccd892735c4b4bcc3af123af
SHA25687c0adbd79908f108504bfaae266aefdcbb2dc1e7ed52b0213640f242bc4c1c7
SHA512e142e8250aa1e0cf1efc64f3fa1d4e13a6fc2992b1471836ca4de1554522d31588cf902f75041e82e42c934dc1d1a3ee5cfc20e36920a9fd4d643bd553f2da13
-
Filesize
4.8MB
MD59a36695d174a4088cb9b8a1e5c93cf93
SHA1f18ca8c1f014506cccd892735c4b4bcc3af123af
SHA25687c0adbd79908f108504bfaae266aefdcbb2dc1e7ed52b0213640f242bc4c1c7
SHA512e142e8250aa1e0cf1efc64f3fa1d4e13a6fc2992b1471836ca4de1554522d31588cf902f75041e82e42c934dc1d1a3ee5cfc20e36920a9fd4d643bd553f2da13