Analysis
-
max time kernel
165s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 05:32
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
144KB
-
MD5
c1f8a4b2c2a1860ad80af57ea4669efa
-
SHA1
e52436d8d8d9ff8a4e41668ac7f4e2f49e495126
-
SHA256
df739f6af2b830e5494a89d291d6d75713383d015c2ac1b61c718d26270d1262
-
SHA512
854be658964b6c4360ad58424f81c565e6958a74276e1d539358de554bd7c71fa9565b199cf3c5354432069dd49f10801fc08ec37e9e123f3820242c23d450b2
-
SSDEEP
3072:wxzevrZuun1S+5nfxJv2CisQMuhJhuthLml/:+evQ41vlQMwhuW
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral2/memory/1088-133-0x00000000007B0000-0x00000000007B9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4084 B87D.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1088 file.exe 1088 file.exe 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2644 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1088 file.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 2644 Process not Found Token: SeCreatePagefilePrivilege 2644 Process not Found Token: SeShutdownPrivilege 2644 Process not Found Token: SeCreatePagefilePrivilege 2644 Process not Found Token: SeShutdownPrivilege 2644 Process not Found Token: SeCreatePagefilePrivilege 2644 Process not Found Token: SeShutdownPrivilege 2644 Process not Found Token: SeCreatePagefilePrivilege 2644 Process not Found -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2644 wrote to memory of 4084 2644 Process not Found 97 PID 2644 wrote to memory of 4084 2644 Process not Found 97 PID 2644 wrote to memory of 4084 2644 Process not Found 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1088
-
C:\Users\Admin\AppData\Local\Temp\B87D.exeC:\Users\Admin\AppData\Local\Temp\B87D.exe1⤵
- Executes dropped EXE
PID:4084
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD57d9db457b9ad7a4ba3e295d7d57aa700
SHA15b4d68862b7e28eb2db4f53633c28c97a9778bc1
SHA25661861d7235d4a8e8d56e6128865c4f27adb41b631723f79646839c8cc1148c66
SHA51293a7aa69c2906611fbacade03c726030d94bc80d666fa80e8bd7b4e1295482b034e5b77952bae40a9959090ba11fa849c437edddfbd05382f335e71815e0cb06
-
Filesize
3.4MB
MD53243a67484222542ec8730014aaeaad9
SHA1ec7751ea97e276e526ffd1e33d15649845220bb6
SHA256ed1a980332ed9dcf76c786de7104c0aa26dd768da973f9e5946c837d2e99b79d
SHA51283dd79ca2f49e701764110a0959bf9944257087e80b6a9336b6a49f80f491ebf0306371ec74c06916c4ce3afec89827e493dfb076a4c092c3eddc5f8ae8ab8fe