Analysis
-
max time kernel
151s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/12/2022, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
220KB
-
MD5
4ffd0c3e0a2c9693ffc3a4c2cb6b0465
-
SHA1
89c65ab1e8fb5d502eacea94f7340779b28008e7
-
SHA256
03885f92a02d31066faa4838a677d3c5993795fafed20c7df0360e9559db4f6b
-
SHA512
0330db6dbf5b3b45ebf8219ddbb41b08009514d91e4fbdc3e629c4c2e82cb31a7c5b65548465ec237da5cea7977ba94186108ff0d5d84e430ec72eeaaf21858d
-
SSDEEP
3072:79LVLUN115RHuBe8fpZf+0oX+Qas+6DkGV7b/Oxi1NHCDml:x5LUNLHuB9fpY0zDmIOWUCa
Malware Config
Signatures
-
Detects Smokeloader packer 6 IoCs
resource yara_rule behavioral2/memory/2512-133-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/3444-135-0x00000000001F0000-0x00000000001F9000-memory.dmp family_smokeloader behavioral2/memory/2512-136-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/2512-137-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/2148-144-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/2148-145-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 692 vbgfhcj 2148 vbgfhcj -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3444 set thread context of 2512 3444 file.exe 80 PID 692 set thread context of 2148 692 vbgfhcj 89 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vbgfhcj Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vbgfhcj Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vbgfhcj -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2512 file.exe 2512 file.exe 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found 2220 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2220 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2512 file.exe 2148 vbgfhcj -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2220 Process not Found Token: SeCreatePagefilePrivilege 2220 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3444 wrote to memory of 2512 3444 file.exe 80 PID 3444 wrote to memory of 2512 3444 file.exe 80 PID 3444 wrote to memory of 2512 3444 file.exe 80 PID 3444 wrote to memory of 2512 3444 file.exe 80 PID 3444 wrote to memory of 2512 3444 file.exe 80 PID 3444 wrote to memory of 2512 3444 file.exe 80 PID 692 wrote to memory of 2148 692 vbgfhcj 89 PID 692 wrote to memory of 2148 692 vbgfhcj 89 PID 692 wrote to memory of 2148 692 vbgfhcj 89 PID 692 wrote to memory of 2148 692 vbgfhcj 89 PID 692 wrote to memory of 2148 692 vbgfhcj 89 PID 692 wrote to memory of 2148 692 vbgfhcj 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2512
-
-
C:\Users\Admin\AppData\Roaming\vbgfhcjC:\Users\Admin\AppData\Roaming\vbgfhcj1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Roaming\vbgfhcjC:\Users\Admin\AppData\Roaming\vbgfhcj2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2148
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD54ffd0c3e0a2c9693ffc3a4c2cb6b0465
SHA189c65ab1e8fb5d502eacea94f7340779b28008e7
SHA25603885f92a02d31066faa4838a677d3c5993795fafed20c7df0360e9559db4f6b
SHA5120330db6dbf5b3b45ebf8219ddbb41b08009514d91e4fbdc3e629c4c2e82cb31a7c5b65548465ec237da5cea7977ba94186108ff0d5d84e430ec72eeaaf21858d
-
Filesize
220KB
MD54ffd0c3e0a2c9693ffc3a4c2cb6b0465
SHA189c65ab1e8fb5d502eacea94f7340779b28008e7
SHA25603885f92a02d31066faa4838a677d3c5993795fafed20c7df0360e9559db4f6b
SHA5120330db6dbf5b3b45ebf8219ddbb41b08009514d91e4fbdc3e629c4c2e82cb31a7c5b65548465ec237da5cea7977ba94186108ff0d5d84e430ec72eeaaf21858d
-
Filesize
220KB
MD54ffd0c3e0a2c9693ffc3a4c2cb6b0465
SHA189c65ab1e8fb5d502eacea94f7340779b28008e7
SHA25603885f92a02d31066faa4838a677d3c5993795fafed20c7df0360e9559db4f6b
SHA5120330db6dbf5b3b45ebf8219ddbb41b08009514d91e4fbdc3e629c4c2e82cb31a7c5b65548465ec237da5cea7977ba94186108ff0d5d84e430ec72eeaaf21858d