Analysis
-
max time kernel
179s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 04:32
Static task
static1
Behavioral task
behavioral1
Sample
e11796b9d679364967df2aaf6f7f96b71e6c6f8090bcc2d4086cfce5f8e70b8f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e11796b9d679364967df2aaf6f7f96b71e6c6f8090bcc2d4086cfce5f8e70b8f.exe
Resource
win10v2004-20220812-en
General
-
Target
e11796b9d679364967df2aaf6f7f96b71e6c6f8090bcc2d4086cfce5f8e70b8f.exe
-
Size
341KB
-
MD5
fd3b279868c450ea0d9c7f7663e12693
-
SHA1
426819cca39893b91b6f4a04ad476b41a88c358b
-
SHA256
e11796b9d679364967df2aaf6f7f96b71e6c6f8090bcc2d4086cfce5f8e70b8f
-
SHA512
0572fe9b55578b5b90ace39f0b7483249b3f3195ff10ac305314f9ec1c443206ee8eb248adcf01cacc4990c09ebbdd08c2dfe2e87f78315013e829da9949ab1a
-
SSDEEP
6144:541i1y0FtEj0euJ0/+ymlgltoCDEAG1PF:541i11cA5J02yWgltJG
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4180-133-0x0000000000030000-0x0000000000039000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
F5E4.exepid process 2740 F5E4.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 5036 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4848 2740 WerFault.exe F5E4.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
e11796b9d679364967df2aaf6f7f96b71e6c6f8090bcc2d4086cfce5f8e70b8f.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e11796b9d679364967df2aaf6f7f96b71e6c6f8090bcc2d4086cfce5f8e70b8f.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e11796b9d679364967df2aaf6f7f96b71e6c6f8090bcc2d4086cfce5f8e70b8f.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e11796b9d679364967df2aaf6f7f96b71e6c6f8090bcc2d4086cfce5f8e70b8f.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e11796b9d679364967df2aaf6f7f96b71e6c6f8090bcc2d4086cfce5f8e70b8f.exepid process 4180 e11796b9d679364967df2aaf6f7f96b71e6c6f8090bcc2d4086cfce5f8e70b8f.exe 4180 e11796b9d679364967df2aaf6f7f96b71e6c6f8090bcc2d4086cfce5f8e70b8f.exe 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2648 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
e11796b9d679364967df2aaf6f7f96b71e6c6f8090bcc2d4086cfce5f8e70b8f.exepid process 4180 e11796b9d679364967df2aaf6f7f96b71e6c6f8090bcc2d4086cfce5f8e70b8f.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 2648 Token: SeCreatePagefilePrivilege 2648 -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
F5E4.exedescription pid process target process PID 2648 wrote to memory of 2740 2648 F5E4.exe PID 2648 wrote to memory of 2740 2648 F5E4.exe PID 2648 wrote to memory of 2740 2648 F5E4.exe PID 2740 wrote to memory of 5036 2740 F5E4.exe rundll32.exe PID 2740 wrote to memory of 5036 2740 F5E4.exe rundll32.exe PID 2740 wrote to memory of 5036 2740 F5E4.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e11796b9d679364967df2aaf6f7f96b71e6c6f8090bcc2d4086cfce5f8e70b8f.exe"C:\Users\Admin\AppData\Local\Temp\e11796b9d679364967df2aaf6f7f96b71e6c6f8090bcc2d4086cfce5f8e70b8f.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\F5E4.exeC:\Users\Admin\AppData\Local\Temp\F5E4.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Eshwsfeuryqqffi.tmp",Qiysidaatietut2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 5562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2740 -ip 27401⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Eshwsfeuryqqffi.tmpFilesize
768KB
MD596655ec3277ef2e9ea4b5723f60f5b04
SHA1b29e9005cedc5e0d63981e59b05a12f006bd8640
SHA25636cb491e91dc40d4a24f25944c5dca41195e1e7eb9788028f72e38b08789616d
SHA512cb151e071426cba0ec433b4ff8b173a9e07fc922e2b9d9d9359bcd5367a79e5bb996e8afbbfe4dd11bde1a33724b7f70479ac248762f5c9d17f3e0d7d67c151c
-
C:\Users\Admin\AppData\Local\Temp\Eshwsfeuryqqffi.tmpFilesize
768KB
MD596655ec3277ef2e9ea4b5723f60f5b04
SHA1b29e9005cedc5e0d63981e59b05a12f006bd8640
SHA25636cb491e91dc40d4a24f25944c5dca41195e1e7eb9788028f72e38b08789616d
SHA512cb151e071426cba0ec433b4ff8b173a9e07fc922e2b9d9d9359bcd5367a79e5bb996e8afbbfe4dd11bde1a33724b7f70479ac248762f5c9d17f3e0d7d67c151c
-
C:\Users\Admin\AppData\Local\Temp\F5E4.exeFilesize
1.1MB
MD5c9d86b8af2b6aa83f5ab8698b4dac416
SHA1c0f65732321e8512b4b7096ba827a2920106968e
SHA256209623f82b569fb476fdef4b1b84b253fd7b224ec5161867e134783a1ae30740
SHA512eeca416617d692d788fba0042a1bc1477a5783d88f6621f159a49644ac718faac7392845c226ad43aed2310c73445bcd7765874579d3d17acdaa36bfdc0a9a15
-
C:\Users\Admin\AppData\Local\Temp\F5E4.exeFilesize
1.1MB
MD5c9d86b8af2b6aa83f5ab8698b4dac416
SHA1c0f65732321e8512b4b7096ba827a2920106968e
SHA256209623f82b569fb476fdef4b1b84b253fd7b224ec5161867e134783a1ae30740
SHA512eeca416617d692d788fba0042a1bc1477a5783d88f6621f159a49644ac718faac7392845c226ad43aed2310c73445bcd7765874579d3d17acdaa36bfdc0a9a15
-
memory/2740-136-0x0000000000000000-mapping.dmp
-
memory/2740-142-0x0000000002261000-0x0000000002340000-memory.dmpFilesize
892KB
-
memory/2740-143-0x0000000002350000-0x0000000002470000-memory.dmpFilesize
1.1MB
-
memory/2740-144-0x0000000000400000-0x0000000000531000-memory.dmpFilesize
1.2MB
-
memory/4180-135-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/4180-132-0x0000000000507000-0x000000000051C000-memory.dmpFilesize
84KB
-
memory/4180-134-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/4180-133-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/5036-139-0x0000000000000000-mapping.dmp