Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
567fd48365da7eec8cacb5866c7418ede8ccf5e7fbda293e6ea8c1d1e63b8fcd.exe
Resource
win10v2004-20220901-en
General
-
Target
567fd48365da7eec8cacb5866c7418ede8ccf5e7fbda293e6ea8c1d1e63b8fcd.exe
-
Size
168KB
-
MD5
2c207ee0ba5c3944109ff01e20c73480
-
SHA1
54913848c723cdf1a79af2fc37f0a03517162baf
-
SHA256
567fd48365da7eec8cacb5866c7418ede8ccf5e7fbda293e6ea8c1d1e63b8fcd
-
SHA512
2950324073d18aad5ca86b645f29076f03127934378e6b7575f9f376cdc75405c8b80c925a262512c336bcc9334fe908c38f517a50b3868496d576e753ba1626
-
SSDEEP
3072:tGXVEp8b/uEx3A1ceS5vCgWn/d2OtBlUw1DZO3axEPrX5f/2B:gQ8j/ISsVLtK3HrXp/2
Malware Config
Signatures
-
Detects Smokeloader packer 6 IoCs
resource yara_rule behavioral1/memory/1592-133-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3392-135-0x0000000000750000-0x0000000000759000-memory.dmp family_smokeloader behavioral1/memory/1592-136-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/1592-137-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4660-166-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4660-167-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 3220 esrvbfg 4660 esrvbfg -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3392 set thread context of 1592 3392 567fd48365da7eec8cacb5866c7418ede8ccf5e7fbda293e6ea8c1d1e63b8fcd.exe 83 PID 3220 set thread context of 4660 3220 esrvbfg 89 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 567fd48365da7eec8cacb5866c7418ede8ccf5e7fbda293e6ea8c1d1e63b8fcd.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 567fd48365da7eec8cacb5866c7418ede8ccf5e7fbda293e6ea8c1d1e63b8fcd.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 567fd48365da7eec8cacb5866c7418ede8ccf5e7fbda293e6ea8c1d1e63b8fcd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI esrvbfg Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI esrvbfg Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI esrvbfg -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1592 567fd48365da7eec8cacb5866c7418ede8ccf5e7fbda293e6ea8c1d1e63b8fcd.exe 1592 567fd48365da7eec8cacb5866c7418ede8ccf5e7fbda293e6ea8c1d1e63b8fcd.exe 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found 2416 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2416 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1592 567fd48365da7eec8cacb5866c7418ede8ccf5e7fbda293e6ea8c1d1e63b8fcd.exe 4660 esrvbfg -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 2416 Process not Found Token: SeCreatePagefilePrivilege 2416 Process not Found Token: SeShutdownPrivilege 2416 Process not Found Token: SeCreatePagefilePrivilege 2416 Process not Found Token: SeShutdownPrivilege 2416 Process not Found Token: SeCreatePagefilePrivilege 2416 Process not Found Token: SeShutdownPrivilege 2416 Process not Found Token: SeCreatePagefilePrivilege 2416 Process not Found Token: SeShutdownPrivilege 2416 Process not Found Token: SeCreatePagefilePrivilege 2416 Process not Found Token: SeShutdownPrivilege 2416 Process not Found Token: SeCreatePagefilePrivilege 2416 Process not Found Token: SeShutdownPrivilege 2416 Process not Found Token: SeCreatePagefilePrivilege 2416 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3392 wrote to memory of 1592 3392 567fd48365da7eec8cacb5866c7418ede8ccf5e7fbda293e6ea8c1d1e63b8fcd.exe 83 PID 3392 wrote to memory of 1592 3392 567fd48365da7eec8cacb5866c7418ede8ccf5e7fbda293e6ea8c1d1e63b8fcd.exe 83 PID 3392 wrote to memory of 1592 3392 567fd48365da7eec8cacb5866c7418ede8ccf5e7fbda293e6ea8c1d1e63b8fcd.exe 83 PID 3392 wrote to memory of 1592 3392 567fd48365da7eec8cacb5866c7418ede8ccf5e7fbda293e6ea8c1d1e63b8fcd.exe 83 PID 3392 wrote to memory of 1592 3392 567fd48365da7eec8cacb5866c7418ede8ccf5e7fbda293e6ea8c1d1e63b8fcd.exe 83 PID 3392 wrote to memory of 1592 3392 567fd48365da7eec8cacb5866c7418ede8ccf5e7fbda293e6ea8c1d1e63b8fcd.exe 83 PID 3220 wrote to memory of 4660 3220 esrvbfg 89 PID 3220 wrote to memory of 4660 3220 esrvbfg 89 PID 3220 wrote to memory of 4660 3220 esrvbfg 89 PID 3220 wrote to memory of 4660 3220 esrvbfg 89 PID 3220 wrote to memory of 4660 3220 esrvbfg 89 PID 3220 wrote to memory of 4660 3220 esrvbfg 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\567fd48365da7eec8cacb5866c7418ede8ccf5e7fbda293e6ea8c1d1e63b8fcd.exe"C:\Users\Admin\AppData\Local\Temp\567fd48365da7eec8cacb5866c7418ede8ccf5e7fbda293e6ea8c1d1e63b8fcd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\567fd48365da7eec8cacb5866c7418ede8ccf5e7fbda293e6ea8c1d1e63b8fcd.exe"C:\Users\Admin\AppData\Local\Temp\567fd48365da7eec8cacb5866c7418ede8ccf5e7fbda293e6ea8c1d1e63b8fcd.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1592
-
-
C:\Users\Admin\AppData\Roaming\esrvbfgC:\Users\Admin\AppData\Roaming\esrvbfg1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Roaming\esrvbfgC:\Users\Admin\AppData\Roaming\esrvbfg2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4660
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD52c207ee0ba5c3944109ff01e20c73480
SHA154913848c723cdf1a79af2fc37f0a03517162baf
SHA256567fd48365da7eec8cacb5866c7418ede8ccf5e7fbda293e6ea8c1d1e63b8fcd
SHA5122950324073d18aad5ca86b645f29076f03127934378e6b7575f9f376cdc75405c8b80c925a262512c336bcc9334fe908c38f517a50b3868496d576e753ba1626
-
Filesize
168KB
MD52c207ee0ba5c3944109ff01e20c73480
SHA154913848c723cdf1a79af2fc37f0a03517162baf
SHA256567fd48365da7eec8cacb5866c7418ede8ccf5e7fbda293e6ea8c1d1e63b8fcd
SHA5122950324073d18aad5ca86b645f29076f03127934378e6b7575f9f376cdc75405c8b80c925a262512c336bcc9334fe908c38f517a50b3868496d576e753ba1626
-
Filesize
168KB
MD52c207ee0ba5c3944109ff01e20c73480
SHA154913848c723cdf1a79af2fc37f0a03517162baf
SHA256567fd48365da7eec8cacb5866c7418ede8ccf5e7fbda293e6ea8c1d1e63b8fcd
SHA5122950324073d18aad5ca86b645f29076f03127934378e6b7575f9f376cdc75405c8b80c925a262512c336bcc9334fe908c38f517a50b3868496d576e753ba1626