Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2022 10:30
Static task
static1
Behavioral task
behavioral1
Sample
bbce2762d2cf06a4cbeae8b8eca305986c8ede78877bca908d80d522ac874f40.exe
Resource
win10v2004-20221111-en
General
-
Target
bbce2762d2cf06a4cbeae8b8eca305986c8ede78877bca908d80d522ac874f40.exe
-
Size
218KB
-
MD5
0139b09e55c73d86375be0662c5674b9
-
SHA1
32c9ee8ac02ef2d8c6d49229c5891a96f983e487
-
SHA256
bbce2762d2cf06a4cbeae8b8eca305986c8ede78877bca908d80d522ac874f40
-
SHA512
a83854daeb1a27cecfaa1b119c2a6502c33b4dd7c55ded378e4e35a770bbc6bc1e1e10cdd86a042112300cfa77d0614a4af4414cb8f8320e8acc6ef5721de8fd
-
SSDEEP
3072:f9p8+LkEERQGHRACUE6zANxp/XMGyt3VW7b/FnlcNHCDml:fH8+Lk3Rge6k3WfVOtkCa
Malware Config
Extracted
systembc
109.205.214.18:443
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4072-133-0x00000000005F0000-0x00000000005F9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
4527.exebsjptaw.exepid process 2224 4527.exe 3448 bsjptaw.exe -
Drops file in Windows directory 2 IoCs
Processes:
4527.exedescription ioc process File created C:\Windows\Tasks\bsjptaw.job 4527.exe File opened for modification C:\Windows\Tasks\bsjptaw.job 4527.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1384 2224 WerFault.exe 4527.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
bbce2762d2cf06a4cbeae8b8eca305986c8ede78877bca908d80d522ac874f40.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bbce2762d2cf06a4cbeae8b8eca305986c8ede78877bca908d80d522ac874f40.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bbce2762d2cf06a4cbeae8b8eca305986c8ede78877bca908d80d522ac874f40.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bbce2762d2cf06a4cbeae8b8eca305986c8ede78877bca908d80d522ac874f40.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
bbce2762d2cf06a4cbeae8b8eca305986c8ede78877bca908d80d522ac874f40.exepid process 4072 bbce2762d2cf06a4cbeae8b8eca305986c8ede78877bca908d80d522ac874f40.exe 4072 bbce2762d2cf06a4cbeae8b8eca305986c8ede78877bca908d80d522ac874f40.exe 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 2532 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2532 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
bbce2762d2cf06a4cbeae8b8eca305986c8ede78877bca908d80d522ac874f40.exepid process 4072 bbce2762d2cf06a4cbeae8b8eca305986c8ede78877bca908d80d522ac874f40.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 2532 Token: SeCreatePagefilePrivilege 2532 Token: SeShutdownPrivilege 2532 Token: SeCreatePagefilePrivilege 2532 Token: SeShutdownPrivilege 2532 Token: SeCreatePagefilePrivilege 2532 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 2532 -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
description pid process target process PID 2532 wrote to memory of 2224 2532 4527.exe PID 2532 wrote to memory of 2224 2532 4527.exe PID 2532 wrote to memory of 2224 2532 4527.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbce2762d2cf06a4cbeae8b8eca305986c8ede78877bca908d80d522ac874f40.exe"C:\Users\Admin\AppData\Local\Temp\bbce2762d2cf06a4cbeae8b8eca305986c8ede78877bca908d80d522ac874f40.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4072
-
C:\Users\Admin\AppData\Local\Temp\4527.exeC:\Users\Admin\AppData\Local\Temp\4527.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 4922⤵
- Program crash
PID:1384
-
C:\ProgramData\helbkxl\bsjptaw.exeC:\ProgramData\helbkxl\bsjptaw.exe start1⤵
- Executes dropped EXE
PID:3448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2224 -ip 22241⤵PID:3732
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218KB
MD5cdc67700f25eaed1417264c4bdec03d3
SHA156639e9414e6ee8394d940d62778475ddf071290
SHA256fdd4cca0516be799c954e96be26b2d04e42ea0bac1edb00604412914bae2f100
SHA512a2b38a1d4d0cb57532f3feb2efa1fb345c03df9114dfb2dcc93286e19b96eb5e182bd79d070a0e4fccf1980f47effc9b511dbb0074bba69bee80098317e08038
-
Filesize
218KB
MD5cdc67700f25eaed1417264c4bdec03d3
SHA156639e9414e6ee8394d940d62778475ddf071290
SHA256fdd4cca0516be799c954e96be26b2d04e42ea0bac1edb00604412914bae2f100
SHA512a2b38a1d4d0cb57532f3feb2efa1fb345c03df9114dfb2dcc93286e19b96eb5e182bd79d070a0e4fccf1980f47effc9b511dbb0074bba69bee80098317e08038
-
Filesize
218KB
MD5cdc67700f25eaed1417264c4bdec03d3
SHA156639e9414e6ee8394d940d62778475ddf071290
SHA256fdd4cca0516be799c954e96be26b2d04e42ea0bac1edb00604412914bae2f100
SHA512a2b38a1d4d0cb57532f3feb2efa1fb345c03df9114dfb2dcc93286e19b96eb5e182bd79d070a0e4fccf1980f47effc9b511dbb0074bba69bee80098317e08038
-
Filesize
218KB
MD5cdc67700f25eaed1417264c4bdec03d3
SHA156639e9414e6ee8394d940d62778475ddf071290
SHA256fdd4cca0516be799c954e96be26b2d04e42ea0bac1edb00604412914bae2f100
SHA512a2b38a1d4d0cb57532f3feb2efa1fb345c03df9114dfb2dcc93286e19b96eb5e182bd79d070a0e4fccf1980f47effc9b511dbb0074bba69bee80098317e08038