Analysis
-
max time kernel
150s -
max time network
93s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
23-11-2022 08:08
Static task
static1
Behavioral task
behavioral1
Sample
bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe
Resource
win10-20220812-en
General
-
Target
bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe
-
Size
186KB
-
MD5
e22f5d82448333c9047bafe9d1331d5f
-
SHA1
4be6fce8f1c01d622e9570a09c1632a96218e474
-
SHA256
bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5
-
SHA512
1bf0ecc04bb0a4f0569769191bb68f040dd4603c51d0de7ecad1018ea9cdd017b2cd39066d0dcc68b6e4db2344882d0e94995396bdc786bb3268e72469d1f936
-
SSDEEP
3072:pBkApSndJOALbdXDWWLD5Acq6NEl84DDx7wg3puD5z26:8A4nLbdXDR5qiEVdZuD1t
Malware Config
Signatures
-
Detects Smokeloader packer 8 IoCs
Processes:
resource yara_rule behavioral1/memory/1976-148-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/1976-147-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/1976-162-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/1976-179-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2916-212-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/4428-221-0x00000000001D0000-0x00000000001D9000-memory.dmp family_smokeloader behavioral1/memory/2916-244-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2916-245-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
Processes:
vhtsfbcvhtsfbcpid process 4428 vhtsfbc 2916 vhtsfbc -
Deletes itself 1 IoCs
Processes:
pid process 2076 -
Suspicious use of SetThreadContext 2 IoCs
Processes:
bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exevhtsfbcdescription pid process target process PID 3516 set thread context of 1976 3516 bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe PID 4428 set thread context of 2916 4428 vhtsfbc vhtsfbc -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
vhtsfbcbff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vhtsfbc Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vhtsfbc Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vhtsfbc Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exepid process 1976 bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe 1976 bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 2076 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2076 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exevhtsfbcpid process 1976 bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe 2916 vhtsfbc -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 2076 Token: SeCreatePagefilePrivilege 2076 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exevhtsfbcdescription pid process target process PID 3516 wrote to memory of 1976 3516 bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe PID 3516 wrote to memory of 1976 3516 bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe PID 3516 wrote to memory of 1976 3516 bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe PID 3516 wrote to memory of 1976 3516 bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe PID 3516 wrote to memory of 1976 3516 bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe PID 3516 wrote to memory of 1976 3516 bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe PID 4428 wrote to memory of 2916 4428 vhtsfbc vhtsfbc PID 4428 wrote to memory of 2916 4428 vhtsfbc vhtsfbc PID 4428 wrote to memory of 2916 4428 vhtsfbc vhtsfbc PID 4428 wrote to memory of 2916 4428 vhtsfbc vhtsfbc PID 4428 wrote to memory of 2916 4428 vhtsfbc vhtsfbc PID 4428 wrote to memory of 2916 4428 vhtsfbc vhtsfbc
Processes
-
C:\Users\Admin\AppData\Local\Temp\bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe"C:\Users\Admin\AppData\Local\Temp\bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe"C:\Users\Admin\AppData\Local\Temp\bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1976
-
C:\Users\Admin\AppData\Roaming\vhtsfbcC:\Users\Admin\AppData\Roaming\vhtsfbc1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Roaming\vhtsfbcC:\Users\Admin\AppData\Roaming\vhtsfbc2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2916
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186KB
MD5e22f5d82448333c9047bafe9d1331d5f
SHA14be6fce8f1c01d622e9570a09c1632a96218e474
SHA256bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5
SHA5121bf0ecc04bb0a4f0569769191bb68f040dd4603c51d0de7ecad1018ea9cdd017b2cd39066d0dcc68b6e4db2344882d0e94995396bdc786bb3268e72469d1f936
-
Filesize
186KB
MD5e22f5d82448333c9047bafe9d1331d5f
SHA14be6fce8f1c01d622e9570a09c1632a96218e474
SHA256bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5
SHA5121bf0ecc04bb0a4f0569769191bb68f040dd4603c51d0de7ecad1018ea9cdd017b2cd39066d0dcc68b6e4db2344882d0e94995396bdc786bb3268e72469d1f936
-
Filesize
186KB
MD5e22f5d82448333c9047bafe9d1331d5f
SHA14be6fce8f1c01d622e9570a09c1632a96218e474
SHA256bff5cd0eab781940d062b34c408f71354b17f8a3bbe30f4b8685da1d4b6be4c5
SHA5121bf0ecc04bb0a4f0569769191bb68f040dd4603c51d0de7ecad1018ea9cdd017b2cd39066d0dcc68b6e4db2344882d0e94995396bdc786bb3268e72469d1f936