Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23/12/2022, 10:15
Behavioral task
behavioral1
Sample
7e057353f31e374c964a61d9364b9b55017fa9bec62a2717b7d527773a36e6ab.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7e057353f31e374c964a61d9364b9b55017fa9bec62a2717b7d527773a36e6ab.exe
Resource
win10v2004-20220901-en
General
-
Target
7e057353f31e374c964a61d9364b9b55017fa9bec62a2717b7d527773a36e6ab.exe
-
Size
30KB
-
MD5
0e1800e4c50951aeebdf95d8e37dd738
-
SHA1
e69af9f01880a973d4235582a5abf887b494f73e
-
SHA256
7e057353f31e374c964a61d9364b9b55017fa9bec62a2717b7d527773a36e6ab
-
SHA512
dedf798c5ec483988dcc718d378bcc49d58b0b3e1624624ca814476b3d260ab2019ed6f0a02ad8c639a5471b2fdd308cfe906caee12991b99ce6bda1fa8c98fe
-
SSDEEP
768:hG7spfR8RX35MzADt9JgXAtL9q3eDXBQjN:E7CsBDt9Jbl7C
Malware Config
Signatures
-
Detects Smokeloader packer 2 IoCs
resource yara_rule behavioral2/memory/4564-132-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/4564-133-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7e057353f31e374c964a61d9364b9b55017fa9bec62a2717b7d527773a36e6ab.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7e057353f31e374c964a61d9364b9b55017fa9bec62a2717b7d527773a36e6ab.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7e057353f31e374c964a61d9364b9b55017fa9bec62a2717b7d527773a36e6ab.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4564 7e057353f31e374c964a61d9364b9b55017fa9bec62a2717b7d527773a36e6ab.exe 4564 7e057353f31e374c964a61d9364b9b55017fa9bec62a2717b7d527773a36e6ab.exe 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found 2756 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2756 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4564 7e057353f31e374c964a61d9364b9b55017fa9bec62a2717b7d527773a36e6ab.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 2756 Process not Found Token: SeCreatePagefilePrivilege 2756 Process not Found Token: SeShutdownPrivilege 2756 Process not Found Token: SeCreatePagefilePrivilege 2756 Process not Found Token: SeShutdownPrivilege 2756 Process not Found Token: SeCreatePagefilePrivilege 2756 Process not Found Token: SeShutdownPrivilege 2756 Process not Found Token: SeCreatePagefilePrivilege 2756 Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e057353f31e374c964a61d9364b9b55017fa9bec62a2717b7d527773a36e6ab.exe"C:\Users\Admin\AppData\Local\Temp\7e057353f31e374c964a61d9364b9b55017fa9bec62a2717b7d527773a36e6ab.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4564