Analysis
-
max time kernel
248s -
max time network
250s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 10:14
Static task
static1
Behavioral task
behavioral1
Sample
832d5ec6e646621706bd90576de0f4d80ea722b50000416a2b9c97170d7a935d.exe
Resource
win10v2004-20221111-en
7 signatures
150 seconds
General
-
Target
832d5ec6e646621706bd90576de0f4d80ea722b50000416a2b9c97170d7a935d.exe
-
Size
146KB
-
MD5
8bb40ddb7b584f7250565039d47bf0f7
-
SHA1
cd312c36e50eeccab467d353f3333074a236860f
-
SHA256
832d5ec6e646621706bd90576de0f4d80ea722b50000416a2b9c97170d7a935d
-
SHA512
e4dd309b5a78125962bf0bcc89aa23ea055b923294b160b51d3607579517ee84ac605147a7bfc041a6934c4b90a9601294446541117509cdbf42cef623a3a958
-
SSDEEP
3072:/5CJpjhyN95v8GoZOqf5j+6fMs23QUhXythRQ:RCHgVDoQAC6fC3QO+hC
Score
10/10
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/4692-133-0x00000000005F0000-0x00000000005F9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 832d5ec6e646621706bd90576de0f4d80ea722b50000416a2b9c97170d7a935d.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 832d5ec6e646621706bd90576de0f4d80ea722b50000416a2b9c97170d7a935d.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 832d5ec6e646621706bd90576de0f4d80ea722b50000416a2b9c97170d7a935d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4692 832d5ec6e646621706bd90576de0f4d80ea722b50000416a2b9c97170d7a935d.exe 4692 832d5ec6e646621706bd90576de0f4d80ea722b50000416a2b9c97170d7a935d.exe 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found 2688 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2688 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4692 832d5ec6e646621706bd90576de0f4d80ea722b50000416a2b9c97170d7a935d.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeShutdownPrivilege 2688 Process not Found Token: SeCreatePagefilePrivilege 2688 Process not Found Token: SeShutdownPrivilege 2688 Process not Found Token: SeCreatePagefilePrivilege 2688 Process not Found Token: SeShutdownPrivilege 2688 Process not Found Token: SeCreatePagefilePrivilege 2688 Process not Found Token: SeShutdownPrivilege 2688 Process not Found Token: SeCreatePagefilePrivilege 2688 Process not Found Token: SeShutdownPrivilege 2688 Process not Found Token: SeCreatePagefilePrivilege 2688 Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\832d5ec6e646621706bd90576de0f4d80ea722b50000416a2b9c97170d7a935d.exe"C:\Users\Admin\AppData\Local\Temp\832d5ec6e646621706bd90576de0f4d80ea722b50000416a2b9c97170d7a935d.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4692