Analysis

  • max time kernel
    188s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 20:23

General

  • Target

    822d1e3b72d036ceb5798950dcce44a2fec8c14ecac3f6fa291b1274484c59f6.exe

  • Size

    147KB

  • MD5

    fa9a085d579c1f06b6cfd9a780359b6e

  • SHA1

    72da3a2b8c47d827c16192863d71c4e57b6fd992

  • SHA256

    822d1e3b72d036ceb5798950dcce44a2fec8c14ecac3f6fa291b1274484c59f6

  • SHA512

    6e85cdee7479aa75f059592a74bda361e0d679bab5be7cf0a9e75a2fc5f5880a1b34042df5aaf8c9eaeecfad96f2a4d4bc2575622185ba19c5c1bf5da408b1c2

  • SSDEEP

    3072:XD2qjwGoZ2nNp58g2V+xZe1mox+naEY5OFJZR:VjAZ2egFx9ox+5Y2R

Malware Config

Signatures

  • Detects Smokeloader packer 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of SetThreadContext 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\822d1e3b72d036ceb5798950dcce44a2fec8c14ecac3f6fa291b1274484c59f6.exe
    "C:\Users\Admin\AppData\Local\Temp\822d1e3b72d036ceb5798950dcce44a2fec8c14ecac3f6fa291b1274484c59f6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:176
    • C:\Users\Admin\AppData\Local\Temp\822d1e3b72d036ceb5798950dcce44a2fec8c14ecac3f6fa291b1274484c59f6.exe
      "C:\Users\Admin\AppData\Local\Temp\822d1e3b72d036ceb5798950dcce44a2fec8c14ecac3f6fa291b1274484c59f6.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:3604

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/176-132-0x000000000076D000-0x000000000077E000-memory.dmp
    Filesize

    68KB

  • memory/176-136-0x00000000006F0000-0x00000000006F9000-memory.dmp
    Filesize

    36KB

  • memory/176-135-0x000000000076D000-0x000000000077E000-memory.dmp
    Filesize

    68KB

  • memory/2644-163-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-185-0x0000000001300000-0x0000000001310000-memory.dmp
    Filesize

    64KB

  • memory/2644-141-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-165-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-142-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-144-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-143-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-145-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-146-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-147-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-148-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-149-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-150-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-151-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-152-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-153-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-154-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-155-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-156-0x00000000034B0000-0x00000000034C0000-memory.dmp
    Filesize

    64KB

  • memory/2644-157-0x0000000007DB0000-0x0000000007DC0000-memory.dmp
    Filesize

    64KB

  • memory/2644-158-0x0000000007DB0000-0x0000000007DC0000-memory.dmp
    Filesize

    64KB

  • memory/2644-159-0x0000000007DB0000-0x0000000007DC0000-memory.dmp
    Filesize

    64KB

  • memory/2644-160-0x0000000007DB0000-0x0000000007DC0000-memory.dmp
    Filesize

    64KB

  • memory/2644-161-0x0000000007DB0000-0x0000000007DC0000-memory.dmp
    Filesize

    64KB

  • memory/2644-164-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-139-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-162-0x0000000007DB0000-0x0000000007DC0000-memory.dmp
    Filesize

    64KB

  • memory/2644-187-0x0000000001300000-0x0000000001310000-memory.dmp
    Filesize

    64KB

  • memory/2644-140-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-167-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-168-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-169-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-170-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-171-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-172-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-173-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-174-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-175-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-176-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-177-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-178-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-179-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-180-0x00000000012F0000-0x0000000001300000-memory.dmp
    Filesize

    64KB

  • memory/2644-181-0x0000000001300000-0x0000000001310000-memory.dmp
    Filesize

    64KB

  • memory/2644-182-0x0000000001300000-0x0000000001310000-memory.dmp
    Filesize

    64KB

  • memory/2644-183-0x0000000001300000-0x0000000001310000-memory.dmp
    Filesize

    64KB

  • memory/2644-184-0x00000000012F0000-0x0000000001300000-memory.dmp
    Filesize

    64KB

  • memory/2644-166-0x00000000030F0000-0x0000000003100000-memory.dmp
    Filesize

    64KB

  • memory/2644-186-0x0000000001300000-0x0000000001310000-memory.dmp
    Filesize

    64KB

  • memory/3604-134-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB

  • memory/3604-133-0x0000000000000000-mapping.dmp
  • memory/3604-137-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB

  • memory/3604-138-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB