Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2022 14:57
Static task
static1
Behavioral task
behavioral1
Sample
6215c136be1a9335085303fa1eb855563b273dd275b9c6e320691a3045c72dba.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6215c136be1a9335085303fa1eb855563b273dd275b9c6e320691a3045c72dba.exe
Resource
win10v2004-20220812-en
General
-
Target
6215c136be1a9335085303fa1eb855563b273dd275b9c6e320691a3045c72dba.exe
-
Size
162KB
-
MD5
10321d39a95cdccc1677c3bcca6cc5f1
-
SHA1
c4f63a737452a7ec50a2d5aa07622b94f65f9be5
-
SHA256
6215c136be1a9335085303fa1eb855563b273dd275b9c6e320691a3045c72dba
-
SHA512
9c630f14b8895da71876fd1e2c7e6d28821348be0c54eae9552651fa8c3747fc47f1967c7c0b9199dcf91794215c06a07c2ac1eddf71b5ad6fb2e5b152a8ae5d
-
SSDEEP
3072:bRECnqOi2JzXbNOp5C3KrGFlOVJ8qIolb1jOOIbXViK:VYOi4buAlO8qIovjs7V
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral2/memory/4864-133-0x00000000022C0000-0x00000000022C9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 1 IoCs
pid Process 4476 biuigci -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6215c136be1a9335085303fa1eb855563b273dd275b9c6e320691a3045c72dba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI biuigci Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI biuigci Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI biuigci Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6215c136be1a9335085303fa1eb855563b273dd275b9c6e320691a3045c72dba.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6215c136be1a9335085303fa1eb855563b273dd275b9c6e320691a3045c72dba.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4864 6215c136be1a9335085303fa1eb855563b273dd275b9c6e320691a3045c72dba.exe 4864 6215c136be1a9335085303fa1eb855563b273dd275b9c6e320691a3045c72dba.exe 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2152 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4864 6215c136be1a9335085303fa1eb855563b273dd275b9c6e320691a3045c72dba.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6215c136be1a9335085303fa1eb855563b273dd275b9c6e320691a3045c72dba.exe"C:\Users\Admin\AppData\Local\Temp\6215c136be1a9335085303fa1eb855563b273dd275b9c6e320691a3045c72dba.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4864
-
C:\Users\Admin\AppData\Roaming\biuigciC:\Users\Admin\AppData\Roaming\biuigci1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4476
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162KB
MD510321d39a95cdccc1677c3bcca6cc5f1
SHA1c4f63a737452a7ec50a2d5aa07622b94f65f9be5
SHA2566215c136be1a9335085303fa1eb855563b273dd275b9c6e320691a3045c72dba
SHA5129c630f14b8895da71876fd1e2c7e6d28821348be0c54eae9552651fa8c3747fc47f1967c7c0b9199dcf91794215c06a07c2ac1eddf71b5ad6fb2e5b152a8ae5d
-
Filesize
162KB
MD510321d39a95cdccc1677c3bcca6cc5f1
SHA1c4f63a737452a7ec50a2d5aa07622b94f65f9be5
SHA2566215c136be1a9335085303fa1eb855563b273dd275b9c6e320691a3045c72dba
SHA5129c630f14b8895da71876fd1e2c7e6d28821348be0c54eae9552651fa8c3747fc47f1967c7c0b9199dcf91794215c06a07c2ac1eddf71b5ad6fb2e5b152a8ae5d