Analysis

  • max time kernel
    156s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 10:35

General

  • Target

    file.exe

  • Size

    186KB

  • MD5

    134701afe1946ef02dd43616ea9ad100

  • SHA1

    5a7dc7947a3824e81ed893ba03886d84092c5bae

  • SHA256

    a0a9dc9dca037ec22207239bf99c94e577ef00fe6bfa959088377d7fc3ac4912

  • SHA512

    0ffafcfd26d00823fe9d137ee812ca6fe7bce02cd7f0046dc10eecb579cc435a04896f52f34790aee0987eca9fedb51c4e24de328609485df27c6090e24cda05

  • SSDEEP

    3072:MDusvefFLMLCmFW4xO5leU1ln/4oiKSIviu:Cu5L6rFvw1h/4oRSIa

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4708
  • C:\Users\Admin\AppData\Local\Temp\A0EE.exe
    C:\Users\Admin\AppData\Local\Temp\A0EE.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Uayqupoehp.tmp",Rrptfe
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      PID:4344
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 460
      2⤵
      • Program crash
      PID:1160
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1480 -ip 1480
    1⤵
      PID:4652

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\A0EE.exe

      Filesize

      1.0MB

      MD5

      01c40d63b3d1f09c8dfd5304c0c7899b

      SHA1

      1d9622ccf4c8edac550b4bcec1bd25704dd5a935

      SHA256

      7e6c4f31583c0959a868d29819f8a321d6bd91cf156e33f0ff5f01941806731a

      SHA512

      30e7116d8b2508ca30bd44baa12fc635125de94a3ef80bf4dfb2cc5f58975388f3e9fac22e13e6ded0ecb9e106d9fb97b2d502fc50b638590453b5985355f75c

    • C:\Users\Admin\AppData\Local\Temp\A0EE.exe

      Filesize

      1.0MB

      MD5

      01c40d63b3d1f09c8dfd5304c0c7899b

      SHA1

      1d9622ccf4c8edac550b4bcec1bd25704dd5a935

      SHA256

      7e6c4f31583c0959a868d29819f8a321d6bd91cf156e33f0ff5f01941806731a

      SHA512

      30e7116d8b2508ca30bd44baa12fc635125de94a3ef80bf4dfb2cc5f58975388f3e9fac22e13e6ded0ecb9e106d9fb97b2d502fc50b638590453b5985355f75c

    • C:\Users\Admin\AppData\Local\Temp\Uayqupoehp.tmp

      Filesize

      774KB

      MD5

      d5e88f35e214f2dff51a7d494316bac2

      SHA1

      6306dfa71c4e32dede210631cf90732693c0afcf

      SHA256

      f1828a7b26be78bb27df25b98762eb7dd7e49ee8582d5eee42ded05b0eebc1e4

      SHA512

      ff167f0379173f976e3f91f41f6c88e67b12dfb0386b66d19f78d3aa3f11534cf2ce1c1d753ada0133cf291adca7ad8367087b791a5c05eaf371dd877ebcce1d

    • C:\Users\Admin\AppData\Local\Temp\Uayqupoehp.tmp

      Filesize

      774KB

      MD5

      d5e88f35e214f2dff51a7d494316bac2

      SHA1

      6306dfa71c4e32dede210631cf90732693c0afcf

      SHA256

      f1828a7b26be78bb27df25b98762eb7dd7e49ee8582d5eee42ded05b0eebc1e4

      SHA512

      ff167f0379173f976e3f91f41f6c88e67b12dfb0386b66d19f78d3aa3f11534cf2ce1c1d753ada0133cf291adca7ad8367087b791a5c05eaf371dd877ebcce1d

    • memory/1480-141-0x0000000000400000-0x000000000071E000-memory.dmp

      Filesize

      3.1MB

    • memory/1480-136-0x0000000000000000-mapping.dmp

    • memory/1480-139-0x0000000002459000-0x000000000253A000-memory.dmp

      Filesize

      900KB

    • memory/1480-140-0x00000000025D0000-0x00000000026F5000-memory.dmp

      Filesize

      1.1MB

    • memory/1480-145-0x0000000000400000-0x000000000071E000-memory.dmp

      Filesize

      3.1MB

    • memory/4344-142-0x0000000000000000-mapping.dmp

    • memory/4708-135-0x0000000000400000-0x000000000064C000-memory.dmp

      Filesize

      2.3MB

    • memory/4708-132-0x000000000071D000-0x000000000072E000-memory.dmp

      Filesize

      68KB

    • memory/4708-134-0x0000000000400000-0x000000000064C000-memory.dmp

      Filesize

      2.3MB

    • memory/4708-133-0x0000000002380000-0x0000000002389000-memory.dmp

      Filesize

      36KB