Analysis

  • max time kernel
    317s
  • max time network
    342s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 16:00

General

  • Target

    61e9b0e536aae823951205ad31941fe09f0c590c525a840eba141e18f7a2d270.exe

  • Size

    167KB

  • MD5

    ac0a73234824c3755e4187b99fc6c191

  • SHA1

    6d997f41c688421e5cec441b6e95c4194665c4a5

  • SHA256

    61e9b0e536aae823951205ad31941fe09f0c590c525a840eba141e18f7a2d270

  • SHA512

    63ea772de6eeb7f55e065ca76f7eda9a206f2a386eb8c974253763903de2bef369bab12312809a470b165884ff77ae6f557a67ffdf6a294594c5e931b7c3ed92

  • SSDEEP

    1536:WdE3QlMq0pS2uii41WGsXw2hWGvDP/flXS+UCqS5tNNdF3uqkbhuEAg/y+2yunqM:QE3QlTIH1WXhyrS5tOnbIEA3Hhxd17

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61e9b0e536aae823951205ad31941fe09f0c590c525a840eba141e18f7a2d270.exe
    "C:\Users\Admin\AppData\Local\Temp\61e9b0e536aae823951205ad31941fe09f0c590c525a840eba141e18f7a2d270.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:5080

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2572-140-0x0000000002360000-0x0000000002370000-memory.dmp

    Filesize

    64KB

  • memory/2572-145-0x0000000007EA0000-0x0000000007EB0000-memory.dmp

    Filesize

    64KB

  • memory/2572-141-0x0000000000AB0000-0x0000000000AC0000-memory.dmp

    Filesize

    64KB

  • memory/2572-142-0x0000000007EB0000-0x0000000007EC0000-memory.dmp

    Filesize

    64KB

  • memory/2572-136-0x0000000000AB0000-0x0000000000AC0000-memory.dmp

    Filesize

    64KB

  • memory/2572-137-0x0000000002360000-0x0000000002370000-memory.dmp

    Filesize

    64KB

  • memory/2572-138-0x0000000002360000-0x0000000002370000-memory.dmp

    Filesize

    64KB

  • memory/2572-139-0x0000000002360000-0x0000000002370000-memory.dmp

    Filesize

    64KB

  • memory/2572-149-0x0000000007EA0000-0x0000000007EB0000-memory.dmp

    Filesize

    64KB

  • memory/2572-148-0x0000000007EA0000-0x0000000007EB0000-memory.dmp

    Filesize

    64KB

  • memory/2572-147-0x0000000007EA0000-0x0000000007EB0000-memory.dmp

    Filesize

    64KB

  • memory/2572-143-0x0000000007EA0000-0x0000000007EB0000-memory.dmp

    Filesize

    64KB

  • memory/2572-144-0x0000000007EA0000-0x0000000007EB0000-memory.dmp

    Filesize

    64KB

  • memory/2572-146-0x0000000007EB0000-0x0000000007EC0000-memory.dmp

    Filesize

    64KB

  • memory/5080-133-0x00000000008A0000-0x00000000008A9000-memory.dmp

    Filesize

    36KB

  • memory/5080-135-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/5080-134-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/5080-132-0x000000000091E000-0x000000000092E000-memory.dmp

    Filesize

    64KB