Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 03:30
Static task
static1
Behavioral task
behavioral1
Sample
9e0ec049617b681301bd6c970c461133e08cb0c0f4bb4be1241dc8ba6de43642.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9e0ec049617b681301bd6c970c461133e08cb0c0f4bb4be1241dc8ba6de43642.exe
Resource
win10v2004-20220812-en
General
-
Target
9e0ec049617b681301bd6c970c461133e08cb0c0f4bb4be1241dc8ba6de43642.exe
-
Size
274KB
-
MD5
d7de0cc636944a78ef28f674e67798d3
-
SHA1
3d167a70946f951ca0f29facca8ed3b991d4720a
-
SHA256
9e0ec049617b681301bd6c970c461133e08cb0c0f4bb4be1241dc8ba6de43642
-
SHA512
4b6a9fc1787ef06473a353b8abe509e8460fa38be40a45d32783ca190d428bb078d80dbb1fb84be2f706b37ae9621cc671176008a6e10d553a1caa602866e7c4
-
SSDEEP
3072:7xXV86YGJwDUbcVFxaWR5ReccWtH37SV8EY1Xx0/iVRvJTcpSbP3YgV2qs64j:7VLwBVFxBSKh0/IDc2fVS
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3192-133-0x0000000000600000-0x0000000000609000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 39 4280 rundll32.exe 48 4280 rundll32.exe 54 4280 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
3400.exepid process 2184 3400.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4280 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3732 2184 WerFault.exe 3400.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
9e0ec049617b681301bd6c970c461133e08cb0c0f4bb4be1241dc8ba6de43642.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9e0ec049617b681301bd6c970c461133e08cb0c0f4bb4be1241dc8ba6de43642.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9e0ec049617b681301bd6c970c461133e08cb0c0f4bb4be1241dc8ba6de43642.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9e0ec049617b681301bd6c970c461133e08cb0c0f4bb4be1241dc8ba6de43642.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9e0ec049617b681301bd6c970c461133e08cb0c0f4bb4be1241dc8ba6de43642.exepid process 3192 9e0ec049617b681301bd6c970c461133e08cb0c0f4bb4be1241dc8ba6de43642.exe 3192 9e0ec049617b681301bd6c970c461133e08cb0c0f4bb4be1241dc8ba6de43642.exe 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 512 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 512 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
9e0ec049617b681301bd6c970c461133e08cb0c0f4bb4be1241dc8ba6de43642.exepid process 3192 9e0ec049617b681301bd6c970c461133e08cb0c0f4bb4be1241dc8ba6de43642.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 512 Token: SeCreatePagefilePrivilege 512 -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
3400.exedescription pid process target process PID 512 wrote to memory of 2184 512 3400.exe PID 512 wrote to memory of 2184 512 3400.exe PID 512 wrote to memory of 2184 512 3400.exe PID 2184 wrote to memory of 4280 2184 3400.exe rundll32.exe PID 2184 wrote to memory of 4280 2184 3400.exe rundll32.exe PID 2184 wrote to memory of 4280 2184 3400.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e0ec049617b681301bd6c970c461133e08cb0c0f4bb4be1241dc8ba6de43642.exe"C:\Users\Admin\AppData\Local\Temp\9e0ec049617b681301bd6c970c461133e08cb0c0f4bb4be1241dc8ba6de43642.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\3400.exeC:\Users\Admin\AppData\Local\Temp\3400.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Eshwsfeuryqqffi.tmp",Qiysidaatietut2⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 5562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2184 -ip 21841⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3400.exeFilesize
1.1MB
MD52cf63f5a820ae17c9fe2e087675c3512
SHA16e94fbdc85a3e18610039f7533a8c5eace0febec
SHA2562a6344b7f08a540282425a5eda9d372b2e3e3d29b2585927f5cd15165bddb942
SHA512c607a835999f9b5cf010e95b131bf2729463a0e5a1d53b3fa86007ecde99ac3e403c2770056c07af25de81f4cfd75628ba042a1585620feb5feab9187c0740d8
-
C:\Users\Admin\AppData\Local\Temp\3400.exeFilesize
1.1MB
MD52cf63f5a820ae17c9fe2e087675c3512
SHA16e94fbdc85a3e18610039f7533a8c5eace0febec
SHA2562a6344b7f08a540282425a5eda9d372b2e3e3d29b2585927f5cd15165bddb942
SHA512c607a835999f9b5cf010e95b131bf2729463a0e5a1d53b3fa86007ecde99ac3e403c2770056c07af25de81f4cfd75628ba042a1585620feb5feab9187c0740d8
-
C:\Users\Admin\AppData\Local\Temp\Eshwsfeuryqqffi.tmpFilesize
768KB
MD596655ec3277ef2e9ea4b5723f60f5b04
SHA1b29e9005cedc5e0d63981e59b05a12f006bd8640
SHA25636cb491e91dc40d4a24f25944c5dca41195e1e7eb9788028f72e38b08789616d
SHA512cb151e071426cba0ec433b4ff8b173a9e07fc922e2b9d9d9359bcd5367a79e5bb996e8afbbfe4dd11bde1a33724b7f70479ac248762f5c9d17f3e0d7d67c151c
-
C:\Users\Admin\AppData\Local\Temp\Eshwsfeuryqqffi.tmpFilesize
768KB
MD596655ec3277ef2e9ea4b5723f60f5b04
SHA1b29e9005cedc5e0d63981e59b05a12f006bd8640
SHA25636cb491e91dc40d4a24f25944c5dca41195e1e7eb9788028f72e38b08789616d
SHA512cb151e071426cba0ec433b4ff8b173a9e07fc922e2b9d9d9359bcd5367a79e5bb996e8afbbfe4dd11bde1a33724b7f70479ac248762f5c9d17f3e0d7d67c151c
-
memory/2184-141-0x0000000000400000-0x0000000000531000-memory.dmpFilesize
1.2MB
-
memory/2184-136-0x0000000000000000-mapping.dmp
-
memory/2184-139-0x00000000020C4000-0x00000000021A3000-memory.dmpFilesize
892KB
-
memory/2184-140-0x00000000022B0000-0x00000000023D0000-memory.dmpFilesize
1.1MB
-
memory/2184-145-0x0000000000400000-0x0000000000531000-memory.dmpFilesize
1.2MB
-
memory/3192-135-0x0000000000400000-0x0000000000463000-memory.dmpFilesize
396KB
-
memory/3192-132-0x0000000000678000-0x0000000000689000-memory.dmpFilesize
68KB
-
memory/3192-134-0x0000000000400000-0x0000000000463000-memory.dmpFilesize
396KB
-
memory/3192-133-0x0000000000600000-0x0000000000609000-memory.dmpFilesize
36KB
-
memory/4280-142-0x0000000000000000-mapping.dmp