Analysis
-
max time kernel
188s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 17:16
Static task
static1
Behavioral task
behavioral1
Sample
eb78b3349eef1e12640e703c83094e688af83cf41af8f6a71056f32e3b48658c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eb78b3349eef1e12640e703c83094e688af83cf41af8f6a71056f32e3b48658c.exe
Resource
win10v2004-20220812-en
General
-
Target
eb78b3349eef1e12640e703c83094e688af83cf41af8f6a71056f32e3b48658c.exe
-
Size
145KB
-
MD5
0ff5c2b7a0e68ba0729716beea4d5825
-
SHA1
5198a445e5719e4b2b4a04a9e6d6c51ff87e3178
-
SHA256
eb78b3349eef1e12640e703c83094e688af83cf41af8f6a71056f32e3b48658c
-
SHA512
079cf3a40ac927b852cb818168f35a6a025ac302a364c03c7a574921c6242791bc57a125c9c49648e38b859b8323f47678dba1f24915ed942abe73cfbd305db5
-
SSDEEP
3072:kPY+hfIw2N5NvqhCZ2e0k2AQAU/Evgk2+R:q3ewGka2e0k2BAK0V
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral2/memory/2560-133-0x00000000005E0000-0x00000000005E9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4676 F18F.exe -
Loads dropped DLL 2 IoCs
pid Process 4788 rundll32.exe 4788 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 800 4676 WerFault.exe 80 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI eb78b3349eef1e12640e703c83094e688af83cf41af8f6a71056f32e3b48658c.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI eb78b3349eef1e12640e703c83094e688af83cf41af8f6a71056f32e3b48658c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI eb78b3349eef1e12640e703c83094e688af83cf41af8f6a71056f32e3b48658c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2560 eb78b3349eef1e12640e703c83094e688af83cf41af8f6a71056f32e3b48658c.exe 2560 eb78b3349eef1e12640e703c83094e688af83cf41af8f6a71056f32e3b48658c.exe 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found 2376 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2376 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2560 eb78b3349eef1e12640e703c83094e688af83cf41af8f6a71056f32e3b48658c.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2376 Process not Found Token: SeCreatePagefilePrivilege 2376 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2376 wrote to memory of 4676 2376 Process not Found 80 PID 2376 wrote to memory of 4676 2376 Process not Found 80 PID 2376 wrote to memory of 4676 2376 Process not Found 80 PID 4676 wrote to memory of 4788 4676 F18F.exe 82 PID 4676 wrote to memory of 4788 4676 F18F.exe 82 PID 4676 wrote to memory of 4788 4676 F18F.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb78b3349eef1e12640e703c83094e688af83cf41af8f6a71056f32e3b48658c.exe"C:\Users\Admin\AppData\Local\Temp\eb78b3349eef1e12640e703c83094e688af83cf41af8f6a71056f32e3b48658c.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2560
-
C:\Users\Admin\AppData\Local\Temp\F18F.exeC:\Users\Admin\AppData\Local\Temp\F18F.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Serpodtudpwhhta.dll,start2⤵
- Loads dropped DLL
PID:4788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4676 -s 4842⤵
- Program crash
PID:800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4676 -ip 46761⤵PID:2140
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5d3d9fc11160252530e9d2a84b37dc825
SHA10ce3a2c4954a052e4b03c31c866dddc2c4c7a115
SHA256b2afb7c23156704b9a6de75699575fffe21a0840faead454913ba1e8b74e3f88
SHA5120839537906f2b893c8b5066a2de52701ab97a8d9e824c41c35a731b321219823dfa717f7ccfd829d7743679edf07c0b3c9025f6f7da5bacbd1e46222d39da2d4
-
Filesize
3.6MB
MD5d3d9fc11160252530e9d2a84b37dc825
SHA10ce3a2c4954a052e4b03c31c866dddc2c4c7a115
SHA256b2afb7c23156704b9a6de75699575fffe21a0840faead454913ba1e8b74e3f88
SHA5120839537906f2b893c8b5066a2de52701ab97a8d9e824c41c35a731b321219823dfa717f7ccfd829d7743679edf07c0b3c9025f6f7da5bacbd1e46222d39da2d4
-
Filesize
4.3MB
MD5d655d63c333b99837e91ddd62a6f54b1
SHA1eafb8132ab5d441bd24121db5d3d65880a68c0be
SHA256ba1f50e519abf2bda8f392321e6459ea6884023bd1d95085bd5189f25e15bcb0
SHA5128e39ac896100f7b2c7e68f9217fad56776780c2daa67f1eb6a31a3efca81c9cbaae3b640abb14188e997132bf078348ccaf3af34344d95baa9f52dfad5137c9b
-
Filesize
4.3MB
MD5d655d63c333b99837e91ddd62a6f54b1
SHA1eafb8132ab5d441bd24121db5d3d65880a68c0be
SHA256ba1f50e519abf2bda8f392321e6459ea6884023bd1d95085bd5189f25e15bcb0
SHA5128e39ac896100f7b2c7e68f9217fad56776780c2daa67f1eb6a31a3efca81c9cbaae3b640abb14188e997132bf078348ccaf3af34344d95baa9f52dfad5137c9b
-
Filesize
4.3MB
MD5d655d63c333b99837e91ddd62a6f54b1
SHA1eafb8132ab5d441bd24121db5d3d65880a68c0be
SHA256ba1f50e519abf2bda8f392321e6459ea6884023bd1d95085bd5189f25e15bcb0
SHA5128e39ac896100f7b2c7e68f9217fad56776780c2daa67f1eb6a31a3efca81c9cbaae3b640abb14188e997132bf078348ccaf3af34344d95baa9f52dfad5137c9b