Resubmissions
19-11-2022 21:40
221119-1jgzlacd49 819-11-2022 13:48
221119-q4ed4adg34 1019-11-2022 06:26
221119-g7aqmscg91 1019-11-2022 05:30
221119-f67hjsbc8t 1015-11-2022 20:50
221115-zm3j2abf6y 1015-11-2022 20:50
221115-zmpm6sfh23 1015-11-2022 20:49
221115-zl6kasfg98 1015-11-2022 20:19
221115-y4ct9sff87 1014-11-2022 19:39
221114-yc4tnsdb92 1014-11-2022 19:34
221114-yakb9adb83 10Analysis
-
max time kernel
38s -
max time network
39s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
15-11-2022 20:49
Static task
static1
Behavioral task
behavioral1
Sample
db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe
Resource
win10-20220812-en
General
-
Target
db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe
-
Size
307KB
-
MD5
0abe50c1509136bf62d2184ab439e7a5
-
SHA1
722a7e2a0dd66f506ba93d24946b8bf504b100c0
-
SHA256
db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50
-
SHA512
0c232d1eaf68c0099fb499fcd40bb33cd604f0259a71b853c296e00cc468342de95548ccf61d9e904cef5d34fd94defbb43f844e9f50a51517c7c95ab66862c5
-
SSDEEP
6144:Gu0FGLnBOUaLPP7S9dW8dsgMF24raEn2E1a:Gu0wTBOU2Pj6EisgM/uUv
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3144-147-0x00000000009A0000-0x00000000009A9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 1 IoCs
Processes:
fbbvieapid process 4648 fbbviea -
Deletes itself 1 IoCs
Processes:
pid process 3028 -
Drops file in Windows directory 3 IoCs
Processes:
taskmgr.exedescription ioc process File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe File created C:\Windows\rescache\_merged\2717123927\3950266016.pri File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exefbbvieadb79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fbbviea Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fbbviea Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fbbviea Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Modifies registry class 1 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exetaskmgr.exepid process 3144 db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe 3144 db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 2112 taskmgr.exe 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 2112 taskmgr.exe 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 2112 taskmgr.exe 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3028 -
Suspicious behavior: LoadsDriver 64 IoCs
Processes:
pid process 4684 5032 4384 4368 4376 4484 4396 4476 3864 4408 4456 4744 4360 4224 392 4188 4280 4080 4220 5044 5064 4752 4240 5068 4996 4404 3808 4024 4728 4724 4664 1872 2180 4736 4760 3148 4656 4772 4632 4568 4588 4616 4768 4532 4628 4528 504 60 4792 652 644 680 564 508 420 1028 1648 1284 1200 1208 1184 1516 1512 1504 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exefbbvieapid process 3144 db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe 4648 fbbviea -
Suspicious use of AdjustPrivilegeToken 37 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 2112 taskmgr.exe Token: SeSystemProfilePrivilege 2112 taskmgr.exe Token: SeCreateGlobalPrivilege 2112 taskmgr.exe Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: 33 2112 taskmgr.exe Token: SeIncBasePriorityPrivilege 2112 taskmgr.exe Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 2112 taskmgr.exe 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exenet.exedescription pid process target process PID 3028 wrote to memory of 4084 3028 cmd.exe PID 3028 wrote to memory of 4084 3028 cmd.exe PID 4084 wrote to memory of 4264 4084 cmd.exe net.exe PID 4084 wrote to memory of 4264 4084 cmd.exe net.exe PID 4264 wrote to memory of 5088 4264 net.exe net1.exe PID 4264 wrote to memory of 5088 4264 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe"C:\Users\Admin\AppData\Local\Temp\db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net.exenet user /add shit shit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user /add shit shit3⤵
-
C:\Users\Admin\AppData\Roaming\fbbvieaC:\Users\Admin\AppData\Roaming\fbbviea1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\fbbvieaFilesize
307KB
MD50abe50c1509136bf62d2184ab439e7a5
SHA1722a7e2a0dd66f506ba93d24946b8bf504b100c0
SHA256db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50
SHA5120c232d1eaf68c0099fb499fcd40bb33cd604f0259a71b853c296e00cc468342de95548ccf61d9e904cef5d34fd94defbb43f844e9f50a51517c7c95ab66862c5
-
C:\Users\Admin\AppData\Roaming\fbbvieaFilesize
307KB
MD50abe50c1509136bf62d2184ab439e7a5
SHA1722a7e2a0dd66f506ba93d24946b8bf504b100c0
SHA256db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50
SHA5120c232d1eaf68c0099fb499fcd40bb33cd604f0259a71b853c296e00cc468342de95548ccf61d9e904cef5d34fd94defbb43f844e9f50a51517c7c95ab66862c5
-
memory/3144-119-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-120-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-121-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-122-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-123-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-124-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-125-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-127-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-128-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-129-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-130-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-131-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-132-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-133-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-135-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-134-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-136-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-137-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-138-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-139-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-140-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-142-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-143-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-141-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-144-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-146-0x0000000000850000-0x00000000008FE000-memory.dmpFilesize
696KB
-
memory/3144-148-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-149-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-150-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-152-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-154-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-153-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-151-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-145-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3144-147-0x00000000009A0000-0x00000000009A9000-memory.dmpFilesize
36KB
-
memory/3144-155-0x0000000000400000-0x0000000000850000-memory.dmpFilesize
4.3MB
-
memory/3144-156-0x0000000000400000-0x0000000000850000-memory.dmpFilesize
4.3MB
-
memory/4084-157-0x0000000000000000-mapping.dmp
-
memory/4264-158-0x0000000000000000-mapping.dmp
-
memory/4648-161-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-162-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-163-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-164-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-166-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-167-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-165-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-170-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-171-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-172-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-173-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-175-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-176-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-177-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-179-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-180-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-183-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-186-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-190-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-193-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-192-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-191-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-189-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-188-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-187-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-185-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-197-0x0000000000400000-0x0000000000850000-memory.dmpFilesize
4.3MB
-
memory/4648-196-0x0000000000850000-0x00000000008FE000-memory.dmpFilesize
696KB
-
memory/4648-184-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-182-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-181-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-178-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-174-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/4648-198-0x0000000000400000-0x0000000000850000-memory.dmpFilesize
4.3MB
-
memory/5088-159-0x0000000000000000-mapping.dmp