Analysis
-
max time kernel
172s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 20:26
Static task
static1
Behavioral task
behavioral1
Sample
c73dda78376b54476a8d18285f5ee7b110001dfdfeb05188716ce187b1f8b6d4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c73dda78376b54476a8d18285f5ee7b110001dfdfeb05188716ce187b1f8b6d4.exe
Resource
win10v2004-20220901-en
General
-
Target
c73dda78376b54476a8d18285f5ee7b110001dfdfeb05188716ce187b1f8b6d4.exe
-
Size
146KB
-
MD5
03242617ef5408ed1d39b7cccc2ed3ce
-
SHA1
48dccb7e1e325f88e879037cb8afa19e076fd2c5
-
SHA256
c73dda78376b54476a8d18285f5ee7b110001dfdfeb05188716ce187b1f8b6d4
-
SHA512
4e01c4858bed43f42d773d49db255ab7dd9376b611b59ce8dadd110dfd419482589e12383e7ed6fe9623768110c12a69d72ff04f26357d33a3395c265eb1220f
-
SSDEEP
3072:qzljXWnKn5i0MHMoGq6BTHshlapFyZis0I+:KDWn3sqsU4pF5x
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/896-56-0x0000000000220000-0x0000000000229000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
c73dda78376b54476a8d18285f5ee7b110001dfdfeb05188716ce187b1f8b6d4.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c73dda78376b54476a8d18285f5ee7b110001dfdfeb05188716ce187b1f8b6d4.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c73dda78376b54476a8d18285f5ee7b110001dfdfeb05188716ce187b1f8b6d4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c73dda78376b54476a8d18285f5ee7b110001dfdfeb05188716ce187b1f8b6d4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
c73dda78376b54476a8d18285f5ee7b110001dfdfeb05188716ce187b1f8b6d4.exepid process 896 c73dda78376b54476a8d18285f5ee7b110001dfdfeb05188716ce187b1f8b6d4.exe 896 c73dda78376b54476a8d18285f5ee7b110001dfdfeb05188716ce187b1f8b6d4.exe 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
c73dda78376b54476a8d18285f5ee7b110001dfdfeb05188716ce187b1f8b6d4.exepid process 896 c73dda78376b54476a8d18285f5ee7b110001dfdfeb05188716ce187b1f8b6d4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1204
Processes
-
C:\Users\Admin\AppData\Local\Temp\c73dda78376b54476a8d18285f5ee7b110001dfdfeb05188716ce187b1f8b6d4.exe"C:\Users\Admin\AppData\Local\Temp\c73dda78376b54476a8d18285f5ee7b110001dfdfeb05188716ce187b1f8b6d4.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/896-54-0x0000000075BA1000-0x0000000075BA3000-memory.dmpFilesize
8KB
-
memory/896-56-0x0000000000220000-0x0000000000229000-memory.dmpFilesize
36KB
-
memory/896-55-0x0000000000BFB000-0x0000000000C0C000-memory.dmpFilesize
68KB
-
memory/896-57-0x0000000000400000-0x0000000000AD6000-memory.dmpFilesize
6.8MB
-
memory/896-58-0x0000000000400000-0x0000000000AD6000-memory.dmpFilesize
6.8MB