Analysis
-
max time kernel
156s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:35
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
186KB
-
MD5
134701afe1946ef02dd43616ea9ad100
-
SHA1
5a7dc7947a3824e81ed893ba03886d84092c5bae
-
SHA256
a0a9dc9dca037ec22207239bf99c94e577ef00fe6bfa959088377d7fc3ac4912
-
SHA512
0ffafcfd26d00823fe9d137ee812ca6fe7bce02cd7f0046dc10eecb579cc435a04896f52f34790aee0987eca9fedb51c4e24de328609485df27c6090e24cda05
-
SSDEEP
3072:MDusvefFLMLCmFW4xO5leU1ln/4oiKSIviu:Cu5L6rFvw1h/4oRSIa
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4708-133-0x0000000002380000-0x0000000002389000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 67 4344 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
A0EE.exepid process 1480 A0EE.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4344 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1160 1480 WerFault.exe A0EE.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
file.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
file.exepid process 4708 file.exe 4708 file.exe 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2720 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
file.exepid process 4708 file.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 2720 Token: SeCreatePagefilePrivilege 2720 -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
A0EE.exedescription pid process target process PID 2720 wrote to memory of 1480 2720 A0EE.exe PID 2720 wrote to memory of 1480 2720 A0EE.exe PID 2720 wrote to memory of 1480 2720 A0EE.exe PID 1480 wrote to memory of 4344 1480 A0EE.exe rundll32.exe PID 1480 wrote to memory of 4344 1480 A0EE.exe rundll32.exe PID 1480 wrote to memory of 4344 1480 A0EE.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4708
-
C:\Users\Admin\AppData\Local\Temp\A0EE.exeC:\Users\Admin\AppData\Local\Temp\A0EE.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Uayqupoehp.tmp",Rrptfe2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 4602⤵
- Program crash
PID:1160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1480 -ip 14801⤵PID:4652
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD501c40d63b3d1f09c8dfd5304c0c7899b
SHA11d9622ccf4c8edac550b4bcec1bd25704dd5a935
SHA2567e6c4f31583c0959a868d29819f8a321d6bd91cf156e33f0ff5f01941806731a
SHA51230e7116d8b2508ca30bd44baa12fc635125de94a3ef80bf4dfb2cc5f58975388f3e9fac22e13e6ded0ecb9e106d9fb97b2d502fc50b638590453b5985355f75c
-
Filesize
1.0MB
MD501c40d63b3d1f09c8dfd5304c0c7899b
SHA11d9622ccf4c8edac550b4bcec1bd25704dd5a935
SHA2567e6c4f31583c0959a868d29819f8a321d6bd91cf156e33f0ff5f01941806731a
SHA51230e7116d8b2508ca30bd44baa12fc635125de94a3ef80bf4dfb2cc5f58975388f3e9fac22e13e6ded0ecb9e106d9fb97b2d502fc50b638590453b5985355f75c
-
Filesize
774KB
MD5d5e88f35e214f2dff51a7d494316bac2
SHA16306dfa71c4e32dede210631cf90732693c0afcf
SHA256f1828a7b26be78bb27df25b98762eb7dd7e49ee8582d5eee42ded05b0eebc1e4
SHA512ff167f0379173f976e3f91f41f6c88e67b12dfb0386b66d19f78d3aa3f11534cf2ce1c1d753ada0133cf291adca7ad8367087b791a5c05eaf371dd877ebcce1d
-
Filesize
774KB
MD5d5e88f35e214f2dff51a7d494316bac2
SHA16306dfa71c4e32dede210631cf90732693c0afcf
SHA256f1828a7b26be78bb27df25b98762eb7dd7e49ee8582d5eee42ded05b0eebc1e4
SHA512ff167f0379173f976e3f91f41f6c88e67b12dfb0386b66d19f78d3aa3f11534cf2ce1c1d753ada0133cf291adca7ad8367087b791a5c05eaf371dd877ebcce1d