Analysis
-
max time kernel
151s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
187KB
-
MD5
489c542faa295d022be460c502aff210
-
SHA1
37f4591403e477e3a8ce9eec502aa6b3b35bd549
-
SHA256
a0c4747fcf2a1de2b4c9d9367342fb495c34f6250400c68ee76b2f5c35991b01
-
SHA512
d74062694d4d53120d149092d5f99b93533e6bbe8a6485f86b16e4e35785f083dbe29ddd2f45782b3c6f47b0c67f2ad11b651853c00000fcaa76739dbf38a508
-
SSDEEP
3072:fNOkXn/d3YoHDLeLSpUkhBoui05zxiQ2uEZUVJscBlJOCWFyAf:0kdFHeLSpU2Ouh2upJDCyAf
Malware Config
Signatures
-
Detects Smokeloader packer 2 IoCs
resource yara_rule behavioral2/memory/1048-133-0x00000000007D0000-0x00000000007D9000-memory.dmp family_smokeloader behavioral2/memory/1048-136-0x00000000007D0000-0x00000000007D9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 1 IoCs
pid Process 3784 dstghjt -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dstghjt Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dstghjt Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dstghjt -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1048 file.exe 1048 file.exe 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3044 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1048 file.exe 3784 dstghjt
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1048
-
C:\Users\Admin\AppData\Roaming\dstghjtC:\Users\Admin\AppData\Roaming\dstghjt1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3784
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187KB
MD5489c542faa295d022be460c502aff210
SHA137f4591403e477e3a8ce9eec502aa6b3b35bd549
SHA256a0c4747fcf2a1de2b4c9d9367342fb495c34f6250400c68ee76b2f5c35991b01
SHA512d74062694d4d53120d149092d5f99b93533e6bbe8a6485f86b16e4e35785f083dbe29ddd2f45782b3c6f47b0c67f2ad11b651853c00000fcaa76739dbf38a508
-
Filesize
187KB
MD5489c542faa295d022be460c502aff210
SHA137f4591403e477e3a8ce9eec502aa6b3b35bd549
SHA256a0c4747fcf2a1de2b4c9d9367342fb495c34f6250400c68ee76b2f5c35991b01
SHA512d74062694d4d53120d149092d5f99b93533e6bbe8a6485f86b16e4e35785f083dbe29ddd2f45782b3c6f47b0c67f2ad11b651853c00000fcaa76739dbf38a508