Analysis
-
max time kernel
164s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:42
Static task
static1
Behavioral task
behavioral1
Sample
a10ae4664c0ca545e23219fb56fccf6c5cfb2d1aacad5af66cd183deb4606988.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a10ae4664c0ca545e23219fb56fccf6c5cfb2d1aacad5af66cd183deb4606988.exe
Resource
win10v2004-20221111-en
General
-
Target
a10ae4664c0ca545e23219fb56fccf6c5cfb2d1aacad5af66cd183deb4606988.exe
-
Size
186KB
-
MD5
d2e0a8b004e9d159fa9b733e6c3ce51b
-
SHA1
cae2d2dcb30fe1a9b6807d8cd17fe9380f288663
-
SHA256
a10ae4664c0ca545e23219fb56fccf6c5cfb2d1aacad5af66cd183deb4606988
-
SHA512
1062ac90d6dd9a9143dd87322a7c8f81e80ac68647c2fea6ca0364bdd396591897723c7d3d4f66ddc7e898aae0a7063feae350112d594310a0bf22e1145778ac
-
SSDEEP
3072:3DAZxCwSP3kLEw4WVko5nRp8WonpkwaMCxQQ+S02GxIsmF+0xbOj:TA4P0LEw4WB8nSwajxQQK2gI1FBxbOj
Malware Config
Signatures
-
Detects Smokeloader packer 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1832-133-0x0000000002390000-0x0000000002399000-memory.dmp family_smokeloader behavioral2/memory/1832-137-0x0000000002390000-0x0000000002399000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
EF4D.exepid process 4056 EF4D.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4552 4056 WerFault.exe EF4D.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
a10ae4664c0ca545e23219fb56fccf6c5cfb2d1aacad5af66cd183deb4606988.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a10ae4664c0ca545e23219fb56fccf6c5cfb2d1aacad5af66cd183deb4606988.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a10ae4664c0ca545e23219fb56fccf6c5cfb2d1aacad5af66cd183deb4606988.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a10ae4664c0ca545e23219fb56fccf6c5cfb2d1aacad5af66cd183deb4606988.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a10ae4664c0ca545e23219fb56fccf6c5cfb2d1aacad5af66cd183deb4606988.exepid process 1832 a10ae4664c0ca545e23219fb56fccf6c5cfb2d1aacad5af66cd183deb4606988.exe 1832 a10ae4664c0ca545e23219fb56fccf6c5cfb2d1aacad5af66cd183deb4606988.exe 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2644 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
a10ae4664c0ca545e23219fb56fccf6c5cfb2d1aacad5af66cd183deb4606988.exepid process 1832 a10ae4664c0ca545e23219fb56fccf6c5cfb2d1aacad5af66cd183deb4606988.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 2644 Token: SeCreatePagefilePrivilege 2644 -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
description pid process target process PID 2644 wrote to memory of 4056 2644 EF4D.exe PID 2644 wrote to memory of 4056 2644 EF4D.exe PID 2644 wrote to memory of 4056 2644 EF4D.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a10ae4664c0ca545e23219fb56fccf6c5cfb2d1aacad5af66cd183deb4606988.exe"C:\Users\Admin\AppData\Local\Temp\a10ae4664c0ca545e23219fb56fccf6c5cfb2d1aacad5af66cd183deb4606988.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1832
-
C:\Users\Admin\AppData\Local\Temp\EF4D.exeC:\Users\Admin\AppData\Local\Temp\EF4D.exe1⤵
- Executes dropped EXE
PID:4056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 4362⤵
- Program crash
PID:4552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4056 -ip 40561⤵PID:3144
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5fc78f5650188734808f725d0934650a1
SHA1e5184b4aa5de2d1121572fbfd3c2f05bf2b9a000
SHA256319ead10ec14192ea1ba28c3079e72a581bbdbb13a67a3ccbe3066dfec86179a
SHA512d74f0f7e0fb32d3ac0ef09fdd6762032044bb48ca298ee68e9e7cfd327db812bff460efe89495778febddeb5fdb3d8aa3d6c1f61d1aff34dcaa0a2bf07f2f3f0
-
Filesize
1.0MB
MD5fc78f5650188734808f725d0934650a1
SHA1e5184b4aa5de2d1121572fbfd3c2f05bf2b9a000
SHA256319ead10ec14192ea1ba28c3079e72a581bbdbb13a67a3ccbe3066dfec86179a
SHA512d74f0f7e0fb32d3ac0ef09fdd6762032044bb48ca298ee68e9e7cfd327db812bff460efe89495778febddeb5fdb3d8aa3d6c1f61d1aff34dcaa0a2bf07f2f3f0