Analysis
-
max time kernel
207s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:16
Static task
static1
Behavioral task
behavioral1
Sample
d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe
Resource
win10v2004-20221111-en
General
-
Target
d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe
-
Size
185KB
-
MD5
2060ebdf8e22efe7caa864eb3cda76b2
-
SHA1
cc77e82b0e183e59f6314f4c307be3fbbcac2725
-
SHA256
d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958
-
SHA512
9b72b90dc5a3a630d2fbff3bd2a746c301ee71a35708e43d87d816d73baf842a29afd24978e2e4e5c178a34f2f741827dead00fc9322f70303058ba262f07d1e
-
SSDEEP
3072:NqloP1M1LObXCWC6O5QlJqgQaTaxTjPBAI5bEqDc866lzSoW:Ml5LObXClWlJJQIaxvPBD5oZ
Malware Config
Signatures
-
Detects Smokeloader packer 4 IoCs
Processes:
resource yara_rule behavioral1/memory/3220-133-0x0000000000700000-0x0000000000709000-memory.dmp family_smokeloader behavioral1/memory/1164-135-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/1164-137-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/1164-138-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exedescription pid process target process PID 3220 set thread context of 1164 3220 d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exepid process 1164 d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe 1164 d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 2528 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2528 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exepid process 1164 d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exedescription pid process target process PID 3220 wrote to memory of 1164 3220 d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe PID 3220 wrote to memory of 1164 3220 d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe PID 3220 wrote to memory of 1164 3220 d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe PID 3220 wrote to memory of 1164 3220 d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe PID 3220 wrote to memory of 1164 3220 d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe PID 3220 wrote to memory of 1164 3220 d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe"C:\Users\Admin\AppData\Local\Temp\d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe"C:\Users\Admin\AppData\Local\Temp\d66af1357430750ed2c60b4956ae01e3e2003cb09d931c75dba1951867727958.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1164