Analysis
-
max time kernel
185s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:29
Static task
static1
Behavioral task
behavioral1
Sample
040bee531281dd8fcfe6d8ced3d5378bac12faa67fa5f972693560c361dec0ed.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
040bee531281dd8fcfe6d8ced3d5378bac12faa67fa5f972693560c361dec0ed.exe
Resource
win10v2004-20220812-en
General
-
Target
040bee531281dd8fcfe6d8ced3d5378bac12faa67fa5f972693560c361dec0ed.exe
-
Size
186KB
-
MD5
190218cd1f147ff77bd6c1e667b496c4
-
SHA1
f53c0d0bc50447fc83fd79d342932870b18a5517
-
SHA256
040bee531281dd8fcfe6d8ced3d5378bac12faa67fa5f972693560c361dec0ed
-
SHA512
d723d0f5d0dbb7c79d4276effe177e88024b28d4dbeaf4b8a76c2958f5d19b1a5496c4b8574b5f97bd42a38183e71db9656e95aaf5b0f7b60d587e3ab12358f4
-
SSDEEP
3072:Uuu8l+NkLRZ6cZW0bk5kBhmL3x55wAaXGMsxiu0nMMw:fuILnhZzj/mL3x55ZaXGxiu0n
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2388-133-0x00000000007D0000-0x00000000007D9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
040bee531281dd8fcfe6d8ced3d5378bac12faa67fa5f972693560c361dec0ed.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 040bee531281dd8fcfe6d8ced3d5378bac12faa67fa5f972693560c361dec0ed.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 040bee531281dd8fcfe6d8ced3d5378bac12faa67fa5f972693560c361dec0ed.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 040bee531281dd8fcfe6d8ced3d5378bac12faa67fa5f972693560c361dec0ed.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
040bee531281dd8fcfe6d8ced3d5378bac12faa67fa5f972693560c361dec0ed.exepid process 2388 040bee531281dd8fcfe6d8ced3d5378bac12faa67fa5f972693560c361dec0ed.exe 2388 040bee531281dd8fcfe6d8ced3d5378bac12faa67fa5f972693560c361dec0ed.exe 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 760 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
040bee531281dd8fcfe6d8ced3d5378bac12faa67fa5f972693560c361dec0ed.exepid process 2388 040bee531281dd8fcfe6d8ced3d5378bac12faa67fa5f972693560c361dec0ed.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\040bee531281dd8fcfe6d8ced3d5378bac12faa67fa5f972693560c361dec0ed.exe"C:\Users\Admin\AppData\Local\Temp\040bee531281dd8fcfe6d8ced3d5378bac12faa67fa5f972693560c361dec0ed.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2388