Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
27-11-2022 18:08
Static task
static1
Behavioral task
behavioral1
Sample
8db8828c288716a77908e48454765eb6a1fcd94ff1ba620c3295c80307934fdf.exe
Resource
win10-20220812-en
General
-
Target
8db8828c288716a77908e48454765eb6a1fcd94ff1ba620c3295c80307934fdf.exe
-
Size
151KB
-
MD5
fdf4e34e1dec16cf394670450b605506
-
SHA1
310d15fe6b60c675d77bf255f51d4723738bef67
-
SHA256
8db8828c288716a77908e48454765eb6a1fcd94ff1ba620c3295c80307934fdf
-
SHA512
abcca97aca7007e60b9ded9c5565d89b757ac8ac1f4317475a553d6795137a424f44fdd62d8de565e512ac52482af090465e9a590689e3f156be54ed32a26edb
-
SSDEEP
3072:25dPwqg43yjc8eFaCWw5XT25K2+C9ggR6bgraahtN4i:Kz3n8QaC+5K1CGgR6WaahtGi
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/3876-139-0x00000000005C0000-0x00000000005C9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 1 IoCs
pid Process 4136 erbfwgi -
Deletes itself 1 IoCs
pid Process 2836 Process not Found -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8db8828c288716a77908e48454765eb6a1fcd94ff1ba620c3295c80307934fdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI erbfwgi Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI erbfwgi Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI erbfwgi Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8db8828c288716a77908e48454765eb6a1fcd94ff1ba620c3295c80307934fdf.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8db8828c288716a77908e48454765eb6a1fcd94ff1ba620c3295c80307934fdf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3876 8db8828c288716a77908e48454765eb6a1fcd94ff1ba620c3295c80307934fdf.exe 3876 8db8828c288716a77908e48454765eb6a1fcd94ff1ba620c3295c80307934fdf.exe 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2836 Process not Found -
Suspicious behavior: MapViewOfSection 20 IoCs
pid Process 3876 8db8828c288716a77908e48454765eb6a1fcd94ff1ba620c3295c80307934fdf.exe 4136 erbfwgi 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found 2836 Process not Found -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2836 wrote to memory of 1968 2836 Process not Found 67 PID 2836 wrote to memory of 1968 2836 Process not Found 67 PID 2836 wrote to memory of 1968 2836 Process not Found 67 PID 2836 wrote to memory of 1968 2836 Process not Found 67 PID 2836 wrote to memory of 4208 2836 Process not Found 68 PID 2836 wrote to memory of 4208 2836 Process not Found 68 PID 2836 wrote to memory of 4208 2836 Process not Found 68 PID 2836 wrote to memory of 2072 2836 Process not Found 69 PID 2836 wrote to memory of 2072 2836 Process not Found 69 PID 2836 wrote to memory of 2072 2836 Process not Found 69 PID 2836 wrote to memory of 2072 2836 Process not Found 69 PID 2836 wrote to memory of 4644 2836 Process not Found 70 PID 2836 wrote to memory of 4644 2836 Process not Found 70 PID 2836 wrote to memory of 4644 2836 Process not Found 70 PID 2836 wrote to memory of 4892 2836 Process not Found 71 PID 2836 wrote to memory of 4892 2836 Process not Found 71 PID 2836 wrote to memory of 4892 2836 Process not Found 71 PID 2836 wrote to memory of 4892 2836 Process not Found 71 PID 2836 wrote to memory of 4840 2836 Process not Found 72 PID 2836 wrote to memory of 4840 2836 Process not Found 72 PID 2836 wrote to memory of 4840 2836 Process not Found 72 PID 2836 wrote to memory of 4840 2836 Process not Found 72 PID 2836 wrote to memory of 1164 2836 Process not Found 73 PID 2836 wrote to memory of 1164 2836 Process not Found 73 PID 2836 wrote to memory of 1164 2836 Process not Found 73 PID 2836 wrote to memory of 1164 2836 Process not Found 73 PID 2836 wrote to memory of 356 2836 Process not Found 74 PID 2836 wrote to memory of 356 2836 Process not Found 74 PID 2836 wrote to memory of 356 2836 Process not Found 74 PID 2836 wrote to memory of 2584 2836 Process not Found 75 PID 2836 wrote to memory of 2584 2836 Process not Found 75 PID 2836 wrote to memory of 2584 2836 Process not Found 75 PID 2836 wrote to memory of 2584 2836 Process not Found 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\8db8828c288716a77908e48454765eb6a1fcd94ff1ba620c3295c80307934fdf.exe"C:\Users\Admin\AppData\Local\Temp\8db8828c288716a77908e48454765eb6a1fcd94ff1ba620c3295c80307934fdf.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3876
-
C:\Users\Admin\AppData\Roaming\erbfwgiC:\Users\Admin\AppData\Roaming\erbfwgi1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4136
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1968
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4208
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2072
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4644
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4892
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4840
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1164
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:356
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2584
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151KB
MD5fdf4e34e1dec16cf394670450b605506
SHA1310d15fe6b60c675d77bf255f51d4723738bef67
SHA2568db8828c288716a77908e48454765eb6a1fcd94ff1ba620c3295c80307934fdf
SHA512abcca97aca7007e60b9ded9c5565d89b757ac8ac1f4317475a553d6795137a424f44fdd62d8de565e512ac52482af090465e9a590689e3f156be54ed32a26edb
-
Filesize
151KB
MD5fdf4e34e1dec16cf394670450b605506
SHA1310d15fe6b60c675d77bf255f51d4723738bef67
SHA2568db8828c288716a77908e48454765eb6a1fcd94ff1ba620c3295c80307934fdf
SHA512abcca97aca7007e60b9ded9c5565d89b757ac8ac1f4317475a553d6795137a424f44fdd62d8de565e512ac52482af090465e9a590689e3f156be54ed32a26edb