Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 04:50
Static task
static1
Behavioral task
behavioral1
Sample
dbb5a1f87b3db55e2228f08b6d2f482db0452af05fe11d579cd4dc92c105086e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dbb5a1f87b3db55e2228f08b6d2f482db0452af05fe11d579cd4dc92c105086e.exe
Resource
win10v2004-20220901-en
General
-
Target
dbb5a1f87b3db55e2228f08b6d2f482db0452af05fe11d579cd4dc92c105086e.exe
-
Size
168KB
-
MD5
21dc7d54b5ccd1be83218d572b202010
-
SHA1
7a814c0bc1a767c18245121f6afb998da48b0b74
-
SHA256
dbb5a1f87b3db55e2228f08b6d2f482db0452af05fe11d579cd4dc92c105086e
-
SHA512
3a34bd23ff052fc285fc6baf81544eea74d36e0af27c85c9cc4afd05f42170cd6592786a2489406ab709a91cc654775cfcb1cb2e96cb2ee29124b5efe8b23baf
-
SSDEEP
3072:O4V1Ra/FLNhS55tYYKnK3QY3fwM6raEAyD:RodLNItYYmpZ2y
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5048-133-0x0000000000860000-0x0000000000869000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
dbb5a1f87b3db55e2228f08b6d2f482db0452af05fe11d579cd4dc92c105086e.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dbb5a1f87b3db55e2228f08b6d2f482db0452af05fe11d579cd4dc92c105086e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dbb5a1f87b3db55e2228f08b6d2f482db0452af05fe11d579cd4dc92c105086e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dbb5a1f87b3db55e2228f08b6d2f482db0452af05fe11d579cd4dc92c105086e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
dbb5a1f87b3db55e2228f08b6d2f482db0452af05fe11d579cd4dc92c105086e.exepid process 5048 dbb5a1f87b3db55e2228f08b6d2f482db0452af05fe11d579cd4dc92c105086e.exe 5048 dbb5a1f87b3db55e2228f08b6d2f482db0452af05fe11d579cd4dc92c105086e.exe 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 2756 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2756 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
dbb5a1f87b3db55e2228f08b6d2f482db0452af05fe11d579cd4dc92c105086e.exepid process 5048 dbb5a1f87b3db55e2228f08b6d2f482db0452af05fe11d579cd4dc92c105086e.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 2756 Token: SeCreatePagefilePrivilege 2756 Token: SeShutdownPrivilege 2756 Token: SeCreatePagefilePrivilege 2756 Token: SeShutdownPrivilege 2756 Token: SeCreatePagefilePrivilege 2756 Token: SeShutdownPrivilege 2756 Token: SeCreatePagefilePrivilege 2756
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbb5a1f87b3db55e2228f08b6d2f482db0452af05fe11d579cd4dc92c105086e.exe"C:\Users\Admin\AppData\Local\Temp\dbb5a1f87b3db55e2228f08b6d2f482db0452af05fe11d579cd4dc92c105086e.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5048