Analysis
-
max time kernel
278s -
max time network
285s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 09:59
Static task
static1
Behavioral task
behavioral1
Sample
e583878f0974903860253b100c69b71aa4bafcb34567ebb60ee53af6900d91bb.exe
Resource
win10v2004-20221111-en
General
-
Target
e583878f0974903860253b100c69b71aa4bafcb34567ebb60ee53af6900d91bb.exe
-
Size
184KB
-
MD5
cb57d4933a6d9ce877f27b034a3b0332
-
SHA1
af274db3e0a20fbd23637aa6129bfdf8ca6ed709
-
SHA256
e583878f0974903860253b100c69b71aa4bafcb34567ebb60ee53af6900d91bb
-
SHA512
db1d5bf204efe872c1dc1ea69156f821c5d0bcbf569859d39314cb67d6b17648fe0243b068f95dec8d20ce274cd997d7e2bb3e2a490abfbd972ad26eb0651f23
-
SSDEEP
3072:9DoMRLPAxgsIK5hz5r8k7wmL9BI2HyNsWsDL90LYZcEJ:6M+xgklh7dHHBV08
Malware Config
Signatures
-
Detects Smokeloader packer 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4556-133-0x00000000005C0000-0x00000000005C9000-memory.dmp family_smokeloader behavioral1/memory/4556-136-0x00000000005C0000-0x00000000005C9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
5F57.exeA877.exepid process 2984 5F57.exe 1724 A877.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
e583878f0974903860253b100c69b71aa4bafcb34567ebb60ee53af6900d91bb.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e583878f0974903860253b100c69b71aa4bafcb34567ebb60ee53af6900d91bb.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e583878f0974903860253b100c69b71aa4bafcb34567ebb60ee53af6900d91bb.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e583878f0974903860253b100c69b71aa4bafcb34567ebb60ee53af6900d91bb.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e583878f0974903860253b100c69b71aa4bafcb34567ebb60ee53af6900d91bb.exepid process 4556 e583878f0974903860253b100c69b71aa4bafcb34567ebb60ee53af6900d91bb.exe 4556 e583878f0974903860253b100c69b71aa4bafcb34567ebb60ee53af6900d91bb.exe 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1204 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
e583878f0974903860253b100c69b71aa4bafcb34567ebb60ee53af6900d91bb.exepid process 4556 e583878f0974903860253b100c69b71aa4bafcb34567ebb60ee53af6900d91bb.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1204 Token: SeCreatePagefilePrivilege 1204 -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
description pid process target process PID 1204 wrote to memory of 2984 1204 5F57.exe PID 1204 wrote to memory of 2984 1204 5F57.exe PID 1204 wrote to memory of 2984 1204 5F57.exe PID 1204 wrote to memory of 1724 1204 A877.exe PID 1204 wrote to memory of 1724 1204 A877.exe PID 1204 wrote to memory of 1724 1204 A877.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e583878f0974903860253b100c69b71aa4bafcb34567ebb60ee53af6900d91bb.exe"C:\Users\Admin\AppData\Local\Temp\e583878f0974903860253b100c69b71aa4bafcb34567ebb60ee53af6900d91bb.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\5F57.exeC:\Users\Admin\AppData\Local\Temp\5F57.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\A877.exeC:\Users\Admin\AppData\Local\Temp\A877.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5F57.exeFilesize
1.2MB
MD50b9a0f37d63b0ed9ab9b662a25357962
SHA1256a3fc7f7d00649ed2664695d508529a4a56368
SHA256d0f0577d7516a681492b8be0ee6f445dbd79242b41e14e03f5f5f60f1b9069c1
SHA512cde99253a4e580ec3b7840cfc0d58846d99299910177c8284fe75aa1b4c6ceafb2ff9fc7d9d453c5a541a65fc6958022e15166fd1ba0e1e0a85bd5f0cfeb03bb
-
C:\Users\Admin\AppData\Local\Temp\A877.exeFilesize
243KB
MD5016b1e045f0c32c751466cbfef9369f9
SHA194278f97e1f4b221cdc7f593507948c618a4e05b
SHA256894197e5c275eb7537858af6ee922a4cc4966f78b74954db74d16bdc9757ff5e
SHA5128300d455690df141dc408d63aaff6944f6019fd474e8ccefe9f7830d9e9a6623a20967831fb348a6a710c97a76d3283f12bb9af6346402d67e76fd74b256529f
-
memory/1724-141-0x0000000000000000-mapping.dmp
-
memory/2984-139-0x0000000000000000-mapping.dmp
-
memory/4556-132-0x000000000068E000-0x000000000069E000-memory.dmpFilesize
64KB
-
memory/4556-133-0x00000000005C0000-0x00000000005C9000-memory.dmpFilesize
36KB
-
memory/4556-134-0x000000000068E000-0x000000000069E000-memory.dmpFilesize
64KB
-
memory/4556-135-0x0000000000400000-0x0000000000464000-memory.dmpFilesize
400KB
-
memory/4556-136-0x00000000005C0000-0x00000000005C9000-memory.dmpFilesize
36KB
-
memory/4556-137-0x0000000000400000-0x0000000000464000-memory.dmpFilesize
400KB
-
memory/4556-138-0x000000000068E000-0x000000000069E000-memory.dmpFilesize
64KB