Analysis
-
max time kernel
152s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
01/12/2022, 18:49
Static task
static1
Behavioral task
behavioral1
Sample
c52f8e9bab827f7703d0cc744998e16f826e43e313a43a103dcbf354da153ce4.exe
Resource
win10-20220901-en
General
-
Target
c52f8e9bab827f7703d0cc744998e16f826e43e313a43a103dcbf354da153ce4.exe
-
Size
193KB
-
MD5
9a897c5b7206c8d629428f06dc7e4266
-
SHA1
398863d469e4d787a462095cd707a9b6c817a653
-
SHA256
c52f8e9bab827f7703d0cc744998e16f826e43e313a43a103dcbf354da153ce4
-
SHA512
43f4d4490d36a6ec68fb9c2dea5d68717f77b106cdc121cd6878b3dbae2341bf47e06f8c8fd47f28a2ac5846ca0113bd01144109c680478012288bce3f3a90b6
-
SSDEEP
3072:Sw7sb0eYqRc5zGhcbtO+gzseQfd4m63G27777777BDAbEaif:xuYq7hcbtG2fem63G277777772Ea
Malware Config
Signatures
-
Detects Smokeloader packer 8 IoCs
resource yara_rule behavioral1/memory/4740-141-0x00000000001E0000-0x00000000001E9000-memory.dmp family_smokeloader behavioral1/memory/4688-150-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/4688-149-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4688-165-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4688-182-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4364-246-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/4364-277-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4364-278-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 4596 ufsjsde 4364 ufsjsde -
Deletes itself 1 IoCs
pid Process 1784 Process not Found -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4740 set thread context of 4688 4740 c52f8e9bab827f7703d0cc744998e16f826e43e313a43a103dcbf354da153ce4.exe 66 PID 4596 set thread context of 4364 4596 ufsjsde 68 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c52f8e9bab827f7703d0cc744998e16f826e43e313a43a103dcbf354da153ce4.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c52f8e9bab827f7703d0cc744998e16f826e43e313a43a103dcbf354da153ce4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c52f8e9bab827f7703d0cc744998e16f826e43e313a43a103dcbf354da153ce4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ufsjsde Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ufsjsde Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ufsjsde -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4688 c52f8e9bab827f7703d0cc744998e16f826e43e313a43a103dcbf354da153ce4.exe 4688 c52f8e9bab827f7703d0cc744998e16f826e43e313a43a103dcbf354da153ce4.exe 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found 1784 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1784 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4688 c52f8e9bab827f7703d0cc744998e16f826e43e313a43a103dcbf354da153ce4.exe 4364 ufsjsde -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeShutdownPrivilege 1784 Process not Found Token: SeCreatePagefilePrivilege 1784 Process not Found Token: SeShutdownPrivilege 1784 Process not Found Token: SeCreatePagefilePrivilege 1784 Process not Found Token: SeShutdownPrivilege 1784 Process not Found Token: SeCreatePagefilePrivilege 1784 Process not Found Token: SeShutdownPrivilege 1784 Process not Found Token: SeCreatePagefilePrivilege 1784 Process not Found Token: SeShutdownPrivilege 1784 Process not Found Token: SeCreatePagefilePrivilege 1784 Process not Found Token: SeShutdownPrivilege 1784 Process not Found Token: SeCreatePagefilePrivilege 1784 Process not Found Token: SeShutdownPrivilege 1784 Process not Found Token: SeCreatePagefilePrivilege 1784 Process not Found Token: SeShutdownPrivilege 1784 Process not Found Token: SeCreatePagefilePrivilege 1784 Process not Found Token: SeShutdownPrivilege 1784 Process not Found Token: SeCreatePagefilePrivilege 1784 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4740 wrote to memory of 4688 4740 c52f8e9bab827f7703d0cc744998e16f826e43e313a43a103dcbf354da153ce4.exe 66 PID 4740 wrote to memory of 4688 4740 c52f8e9bab827f7703d0cc744998e16f826e43e313a43a103dcbf354da153ce4.exe 66 PID 4740 wrote to memory of 4688 4740 c52f8e9bab827f7703d0cc744998e16f826e43e313a43a103dcbf354da153ce4.exe 66 PID 4740 wrote to memory of 4688 4740 c52f8e9bab827f7703d0cc744998e16f826e43e313a43a103dcbf354da153ce4.exe 66 PID 4740 wrote to memory of 4688 4740 c52f8e9bab827f7703d0cc744998e16f826e43e313a43a103dcbf354da153ce4.exe 66 PID 4740 wrote to memory of 4688 4740 c52f8e9bab827f7703d0cc744998e16f826e43e313a43a103dcbf354da153ce4.exe 66 PID 4596 wrote to memory of 4364 4596 ufsjsde 68 PID 4596 wrote to memory of 4364 4596 ufsjsde 68 PID 4596 wrote to memory of 4364 4596 ufsjsde 68 PID 4596 wrote to memory of 4364 4596 ufsjsde 68 PID 4596 wrote to memory of 4364 4596 ufsjsde 68 PID 4596 wrote to memory of 4364 4596 ufsjsde 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\c52f8e9bab827f7703d0cc744998e16f826e43e313a43a103dcbf354da153ce4.exe"C:\Users\Admin\AppData\Local\Temp\c52f8e9bab827f7703d0cc744998e16f826e43e313a43a103dcbf354da153ce4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\c52f8e9bab827f7703d0cc744998e16f826e43e313a43a103dcbf354da153ce4.exe"C:\Users\Admin\AppData\Local\Temp\c52f8e9bab827f7703d0cc744998e16f826e43e313a43a103dcbf354da153ce4.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4688
-
-
C:\Users\Admin\AppData\Roaming\ufsjsdeC:\Users\Admin\AppData\Roaming\ufsjsde1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Roaming\ufsjsdeC:\Users\Admin\AppData\Roaming\ufsjsde2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4364
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
193KB
MD59a897c5b7206c8d629428f06dc7e4266
SHA1398863d469e4d787a462095cd707a9b6c817a653
SHA256c52f8e9bab827f7703d0cc744998e16f826e43e313a43a103dcbf354da153ce4
SHA51243f4d4490d36a6ec68fb9c2dea5d68717f77b106cdc121cd6878b3dbae2341bf47e06f8c8fd47f28a2ac5846ca0113bd01144109c680478012288bce3f3a90b6
-
Filesize
193KB
MD59a897c5b7206c8d629428f06dc7e4266
SHA1398863d469e4d787a462095cd707a9b6c817a653
SHA256c52f8e9bab827f7703d0cc744998e16f826e43e313a43a103dcbf354da153ce4
SHA51243f4d4490d36a6ec68fb9c2dea5d68717f77b106cdc121cd6878b3dbae2341bf47e06f8c8fd47f28a2ac5846ca0113bd01144109c680478012288bce3f3a90b6
-
Filesize
193KB
MD59a897c5b7206c8d629428f06dc7e4266
SHA1398863d469e4d787a462095cd707a9b6c817a653
SHA256c52f8e9bab827f7703d0cc744998e16f826e43e313a43a103dcbf354da153ce4
SHA51243f4d4490d36a6ec68fb9c2dea5d68717f77b106cdc121cd6878b3dbae2341bf47e06f8c8fd47f28a2ac5846ca0113bd01144109c680478012288bce3f3a90b6