Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
18-12-2022 20:48
Static task
static1
Behavioral task
behavioral1
Sample
7fb0c851b63a456e9eed918bf8f947c47b6e877e3e1c4a152d690313e3182d56.exe
Resource
win10-20220812-en
General
-
Target
7fb0c851b63a456e9eed918bf8f947c47b6e877e3e1c4a152d690313e3182d56.exe
-
Size
213KB
-
MD5
05ab6b167e3ebd16b557f5d8a87a8804
-
SHA1
9469b33c4409f536a049b66356f50a494b59c88c
-
SHA256
7fb0c851b63a456e9eed918bf8f947c47b6e877e3e1c4a152d690313e3182d56
-
SHA512
c32de8bbec7a0fa4a1c21d60628940dad60004e2af89da0f5b6ea0eaf9a75ac934ee333929f336e17821afbaf7366657145d8211e1724bb83a6868f9fdc9c360
-
SSDEEP
3072:q6Ie5YLkxrkuKRgkoD1EDc170ulTUyx4nMMuNRAtOba+kbfZN5RjcbImdzmuX:RIeGLkBkzDWo6hyMMu0xzZ3RjcbXF
Malware Config
Signatures
-
Detects Smokeloader packer 8 IoCs
resource yara_rule behavioral1/memory/2196-147-0x00000000001D0000-0x00000000001D9000-memory.dmp family_smokeloader behavioral1/memory/3292-150-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3292-151-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/3292-165-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3292-182-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2288-213-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/2288-245-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2288-246-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 3268 tevbitr 2288 tevbitr -
Deletes itself 1 IoCs
pid Process 2068 Process not Found -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2196 set thread context of 3292 2196 7fb0c851b63a456e9eed918bf8f947c47b6e877e3e1c4a152d690313e3182d56.exe 66 PID 3268 set thread context of 2288 3268 tevbitr 68 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tevbitr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7fb0c851b63a456e9eed918bf8f947c47b6e877e3e1c4a152d690313e3182d56.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7fb0c851b63a456e9eed918bf8f947c47b6e877e3e1c4a152d690313e3182d56.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7fb0c851b63a456e9eed918bf8f947c47b6e877e3e1c4a152d690313e3182d56.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tevbitr Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tevbitr -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3292 7fb0c851b63a456e9eed918bf8f947c47b6e877e3e1c4a152d690313e3182d56.exe 3292 7fb0c851b63a456e9eed918bf8f947c47b6e877e3e1c4a152d690313e3182d56.exe 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2068 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3292 7fb0c851b63a456e9eed918bf8f947c47b6e877e3e1c4a152d690313e3182d56.exe 2288 tevbitr -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2068 Process not Found Token: SeCreatePagefilePrivilege 2068 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2196 wrote to memory of 3292 2196 7fb0c851b63a456e9eed918bf8f947c47b6e877e3e1c4a152d690313e3182d56.exe 66 PID 2196 wrote to memory of 3292 2196 7fb0c851b63a456e9eed918bf8f947c47b6e877e3e1c4a152d690313e3182d56.exe 66 PID 2196 wrote to memory of 3292 2196 7fb0c851b63a456e9eed918bf8f947c47b6e877e3e1c4a152d690313e3182d56.exe 66 PID 2196 wrote to memory of 3292 2196 7fb0c851b63a456e9eed918bf8f947c47b6e877e3e1c4a152d690313e3182d56.exe 66 PID 2196 wrote to memory of 3292 2196 7fb0c851b63a456e9eed918bf8f947c47b6e877e3e1c4a152d690313e3182d56.exe 66 PID 2196 wrote to memory of 3292 2196 7fb0c851b63a456e9eed918bf8f947c47b6e877e3e1c4a152d690313e3182d56.exe 66 PID 3268 wrote to memory of 2288 3268 tevbitr 68 PID 3268 wrote to memory of 2288 3268 tevbitr 68 PID 3268 wrote to memory of 2288 3268 tevbitr 68 PID 3268 wrote to memory of 2288 3268 tevbitr 68 PID 3268 wrote to memory of 2288 3268 tevbitr 68 PID 3268 wrote to memory of 2288 3268 tevbitr 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fb0c851b63a456e9eed918bf8f947c47b6e877e3e1c4a152d690313e3182d56.exe"C:\Users\Admin\AppData\Local\Temp\7fb0c851b63a456e9eed918bf8f947c47b6e877e3e1c4a152d690313e3182d56.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\7fb0c851b63a456e9eed918bf8f947c47b6e877e3e1c4a152d690313e3182d56.exe"C:\Users\Admin\AppData\Local\Temp\7fb0c851b63a456e9eed918bf8f947c47b6e877e3e1c4a152d690313e3182d56.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3292
-
-
C:\Users\Admin\AppData\Roaming\tevbitrC:\Users\Admin\AppData\Roaming\tevbitr1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Roaming\tevbitrC:\Users\Admin\AppData\Roaming\tevbitr2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2288
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD505ab6b167e3ebd16b557f5d8a87a8804
SHA19469b33c4409f536a049b66356f50a494b59c88c
SHA2567fb0c851b63a456e9eed918bf8f947c47b6e877e3e1c4a152d690313e3182d56
SHA512c32de8bbec7a0fa4a1c21d60628940dad60004e2af89da0f5b6ea0eaf9a75ac934ee333929f336e17821afbaf7366657145d8211e1724bb83a6868f9fdc9c360
-
Filesize
213KB
MD505ab6b167e3ebd16b557f5d8a87a8804
SHA19469b33c4409f536a049b66356f50a494b59c88c
SHA2567fb0c851b63a456e9eed918bf8f947c47b6e877e3e1c4a152d690313e3182d56
SHA512c32de8bbec7a0fa4a1c21d60628940dad60004e2af89da0f5b6ea0eaf9a75ac934ee333929f336e17821afbaf7366657145d8211e1724bb83a6868f9fdc9c360
-
Filesize
213KB
MD505ab6b167e3ebd16b557f5d8a87a8804
SHA19469b33c4409f536a049b66356f50a494b59c88c
SHA2567fb0c851b63a456e9eed918bf8f947c47b6e877e3e1c4a152d690313e3182d56
SHA512c32de8bbec7a0fa4a1c21d60628940dad60004e2af89da0f5b6ea0eaf9a75ac934ee333929f336e17821afbaf7366657145d8211e1724bb83a6868f9fdc9c360