Analysis
-
max time kernel
151s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 04:20
Static task
static1
Behavioral task
behavioral1
Sample
a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe
Resource
win10v2004-20220812-en
General
-
Target
a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe
-
Size
167KB
-
MD5
da4afd549426c3e6295e9a72e3872cda
-
SHA1
5e523e4069b17263af7e96afa24efd2227ec2158
-
SHA256
a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad
-
SHA512
9c34bfe0ae72461e88c086aaac8746e5a6e730223fcd2788e889432ebd25eba1acd4dcdd9917b9d180989a604b90e1ac5272187252140ad7631a97331b1a5d2a
-
SSDEEP
3072:Wrd9Ya2ZukYxzS5baNcb/ZfnKIoq4+2pGSbAP:wPELYxwvBCIL4PGJP
Malware Config
Signatures
-
Detects Smokeloader packer 5 IoCs
Processes:
resource yara_rule behavioral1/memory/892-54-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/892-55-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/1852-58-0x00000000001B0000-0x00000000001B9000-memory.dmp family_smokeloader behavioral1/memory/892-59-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/892-60-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exedescription pid process target process PID 1852 set thread context of 892 1852 a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exepid process 892 a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe 892 a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exepid process 892 a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exedescription pid process target process PID 1852 wrote to memory of 892 1852 a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe PID 1852 wrote to memory of 892 1852 a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe PID 1852 wrote to memory of 892 1852 a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe PID 1852 wrote to memory of 892 1852 a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe PID 1852 wrote to memory of 892 1852 a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe PID 1852 wrote to memory of 892 1852 a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe PID 1852 wrote to memory of 892 1852 a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe"C:\Users\Admin\AppData\Local\Temp\a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe"C:\Users\Admin\AppData\Local\Temp\a23071ca8b7cb1a2a85fd54efe3a5cf2f80470c9846efce69dd72d659f2670ad.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:892
-