Analysis
-
max time kernel
151s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 07:01
Static task
static1
Behavioral task
behavioral1
Sample
929882be0fa5b77a571251f3698d0bc8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
929882be0fa5b77a571251f3698d0bc8.exe
Resource
win10v2004-20221111-en
General
-
Target
929882be0fa5b77a571251f3698d0bc8.exe
-
Size
301KB
-
MD5
929882be0fa5b77a571251f3698d0bc8
-
SHA1
065434ea50364cfb31727af153bc887e33a8c8a4
-
SHA256
082a06d914150e8388b803745507a56f8387d6f3dea943f44525e58955de9019
-
SHA512
ad8d4344debc2c7a78d45bc98aeee7d1be04197e0e7d35a7cbf8742575cd04a9e79f2c375512306a5d2af9b20a37425239480d0db4417145981bb03baab9f0b8
-
SSDEEP
6144:ia7t2SlY1ZvPhn4Tfxq+TZ2KNauCflrX4lO6fE6Nn:t8Wyv14TfxJdcuQlrDJ6N
Malware Config
Signatures
-
Detects Smokeloader packer 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1832-54-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/1832-55-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/1264-58-0x00000000002A0000-0x00000000002A9000-memory.dmp family_smokeloader behavioral1/memory/1832-59-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/1832-60-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
929882be0fa5b77a571251f3698d0bc8.exedescription pid process target process PID 1264 set thread context of 1832 1264 929882be0fa5b77a571251f3698d0bc8.exe 929882be0fa5b77a571251f3698d0bc8.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
929882be0fa5b77a571251f3698d0bc8.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 929882be0fa5b77a571251f3698d0bc8.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 929882be0fa5b77a571251f3698d0bc8.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 929882be0fa5b77a571251f3698d0bc8.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
929882be0fa5b77a571251f3698d0bc8.exepid process 1832 929882be0fa5b77a571251f3698d0bc8.exe 1832 929882be0fa5b77a571251f3698d0bc8.exe 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1220 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
929882be0fa5b77a571251f3698d0bc8.exepid process 1832 929882be0fa5b77a571251f3698d0bc8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1220 -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
929882be0fa5b77a571251f3698d0bc8.exedescription pid process target process PID 1264 wrote to memory of 1832 1264 929882be0fa5b77a571251f3698d0bc8.exe 929882be0fa5b77a571251f3698d0bc8.exe PID 1264 wrote to memory of 1832 1264 929882be0fa5b77a571251f3698d0bc8.exe 929882be0fa5b77a571251f3698d0bc8.exe PID 1264 wrote to memory of 1832 1264 929882be0fa5b77a571251f3698d0bc8.exe 929882be0fa5b77a571251f3698d0bc8.exe PID 1264 wrote to memory of 1832 1264 929882be0fa5b77a571251f3698d0bc8.exe 929882be0fa5b77a571251f3698d0bc8.exe PID 1264 wrote to memory of 1832 1264 929882be0fa5b77a571251f3698d0bc8.exe 929882be0fa5b77a571251f3698d0bc8.exe PID 1264 wrote to memory of 1832 1264 929882be0fa5b77a571251f3698d0bc8.exe 929882be0fa5b77a571251f3698d0bc8.exe PID 1264 wrote to memory of 1832 1264 929882be0fa5b77a571251f3698d0bc8.exe 929882be0fa5b77a571251f3698d0bc8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\929882be0fa5b77a571251f3698d0bc8.exe"C:\Users\Admin\AppData\Local\Temp\929882be0fa5b77a571251f3698d0bc8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\929882be0fa5b77a571251f3698d0bc8.exe"C:\Users\Admin\AppData\Local\Temp\929882be0fa5b77a571251f3698d0bc8.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1832