Analysis
-
max time kernel
150s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:17
Static task
static1
Behavioral task
behavioral1
Sample
1be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170.exe
Resource
win10v2004-20221111-en
General
-
Target
1be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170.exe
-
Size
164KB
-
MD5
5664b9abe1b27ac646d149a4e0383d3a
-
SHA1
95ae306087d40d64757c8328d5ecad288025a254
-
SHA256
1be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170
-
SHA512
478e753a03a9bcb5040acd1122d1f274cef481711d0e9858474c84f36e9dbdc5d5eddab5ee205ff3ab4d8a33872251f0d130ace7f12cf017efe510424576fb7e
-
SSDEEP
3072:ASpYdBUSchnEDRjIs+IrRiSv4Z9QkDIUCeTxnMwwYeIfB4cOS8oCRcLYB3IMgHZp:1edBUSeWjwwRiMGDIUCe1nMwuIfB4cOy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Smohua.exepid process 1924 Smohua.exe -
Drops file in Windows directory 6 IoCs
Processes:
1be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170.exeSmohua.exedescription ioc process File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 1be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 1be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170.exe File created C:\Windows\Smohua.exe 1be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170.exe File opened for modification C:\Windows\Smohua.exe 1be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Smohua.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Smohua.exe -
Processes:
Smohua.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\International Smohua.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
1be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170.exeSmohua.exepid process 1900 1be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe 1924 Smohua.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
1be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170.exedescription pid process target process PID 1900 wrote to memory of 1924 1900 1be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170.exe Smohua.exe PID 1900 wrote to memory of 1924 1900 1be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170.exe Smohua.exe PID 1900 wrote to memory of 1924 1900 1be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170.exe Smohua.exe PID 1900 wrote to memory of 1924 1900 1be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170.exe Smohua.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170.exe"C:\Users\Admin\AppData\Local\Temp\1be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\Smohua.exeC:\Windows\Smohua.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1924
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD55664b9abe1b27ac646d149a4e0383d3a
SHA195ae306087d40d64757c8328d5ecad288025a254
SHA2561be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170
SHA512478e753a03a9bcb5040acd1122d1f274cef481711d0e9858474c84f36e9dbdc5d5eddab5ee205ff3ab4d8a33872251f0d130ace7f12cf017efe510424576fb7e
-
Filesize
408B
MD5a4bcde6e0df739fefc86813f02674a57
SHA13ade3b071e047a66467e1604c2b5a7d4813ba09c
SHA256edbf1e435441d8a3bbced0b2b090d4c48e7f3fed83c22b3a0d5f518c8701ac39
SHA5121ea1a60c9c011ace1661eb473b3109fc1a05a2b4549c14e5775255bd70dbacbf6dab55a6f03cda83015d86b16484241beea1b73ef5c7aaecc1922a19c2c85c0f