Analysis
-
max time kernel
159s -
max time network
164s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
27-11-2022 08:02
Static task
static1
Behavioral task
behavioral1
Sample
a827e864fdf2a30cd6060a50bc4d5199075818c245804f1ddb3e66ee2040c3e7.exe
Resource
win10-20220812-en
General
-
Target
a827e864fdf2a30cd6060a50bc4d5199075818c245804f1ddb3e66ee2040c3e7.exe
-
Size
147KB
-
MD5
b3957dda4bc08c70919b56437c84c991
-
SHA1
478e0d84b12d251d0a0f15fd56c82f5047d35541
-
SHA256
a827e864fdf2a30cd6060a50bc4d5199075818c245804f1ddb3e66ee2040c3e7
-
SHA512
df1b766d4bcacd3f19089acc40ec1e38b072997f1f1d610715c521f16881229218055c6afd0553d5c40cb2e76c39b65b6966e0cf7a32cfa2ed6a388d3d272adf
-
SSDEEP
3072:Q6y3PGucCoKGE5q4sDm5sojaRzKzYAuI9CYH:0bFD1sDXojaQcCL
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3676-153-0x00000000006D0000-0x00000000006D9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 3048 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
a827e864fdf2a30cd6060a50bc4d5199075818c245804f1ddb3e66ee2040c3e7.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a827e864fdf2a30cd6060a50bc4d5199075818c245804f1ddb3e66ee2040c3e7.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a827e864fdf2a30cd6060a50bc4d5199075818c245804f1ddb3e66ee2040c3e7.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a827e864fdf2a30cd6060a50bc4d5199075818c245804f1ddb3e66ee2040c3e7.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a827e864fdf2a30cd6060a50bc4d5199075818c245804f1ddb3e66ee2040c3e7.exepid process 3676 a827e864fdf2a30cd6060a50bc4d5199075818c245804f1ddb3e66ee2040c3e7.exe 3676 a827e864fdf2a30cd6060a50bc4d5199075818c245804f1ddb3e66ee2040c3e7.exe 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3048 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
a827e864fdf2a30cd6060a50bc4d5199075818c245804f1ddb3e66ee2040c3e7.exepid process 3676 a827e864fdf2a30cd6060a50bc4d5199075818c245804f1ddb3e66ee2040c3e7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a827e864fdf2a30cd6060a50bc4d5199075818c245804f1ddb3e66ee2040c3e7.exe"C:\Users\Admin\AppData\Local\Temp\a827e864fdf2a30cd6060a50bc4d5199075818c245804f1ddb3e66ee2040c3e7.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3676