Analysis

  • max time kernel
    159s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 20:34

General

  • Target

    7f4aaa2d33ef4d8a0fb1859d25b67a5811346f102ba286a91f01fb6d055e1df4.exe

  • Size

    145KB

  • MD5

    d22c505c9e2bc73de79d6c4209a4ce01

  • SHA1

    9bbe527c888f7b0fec2ae0c9613d0c1299274291

  • SHA256

    7f4aaa2d33ef4d8a0fb1859d25b67a5811346f102ba286a91f01fb6d055e1df4

  • SHA512

    76f1f15f436c8c99445717387d406e72da887e1a76776cc0079efa5c6fb1d7acaa9e8062ed1e63c00a02783345110eb6d4ee74b0703f55e43225c8090354aaa1

  • SSDEEP

    3072:VDqXHpLWZ2XNp5nQcxBBPodB22ArT79nTEC7WQ/:uHYZ2hQcBS2JTdTLH

Malware Config

Signatures

  • Detects Smokeloader packer 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f4aaa2d33ef4d8a0fb1859d25b67a5811346f102ba286a91f01fb6d055e1df4.exe
    "C:\Users\Admin\AppData\Local\Temp\7f4aaa2d33ef4d8a0fb1859d25b67a5811346f102ba286a91f01fb6d055e1df4.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4884

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4884-132-0x000000000053D000-0x000000000054D000-memory.dmp
    Filesize

    64KB

  • memory/4884-133-0x0000000002190000-0x0000000002199000-memory.dmp
    Filesize

    36KB

  • memory/4884-134-0x0000000000400000-0x000000000045A000-memory.dmp
    Filesize

    360KB

  • memory/4884-135-0x000000000053D000-0x000000000054D000-memory.dmp
    Filesize

    64KB

  • memory/4884-136-0x0000000002190000-0x0000000002199000-memory.dmp
    Filesize

    36KB

  • memory/4884-137-0x0000000000400000-0x000000000045A000-memory.dmp
    Filesize

    360KB