Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2022, 17:35
Static task
static1
Behavioral task
behavioral1
Sample
048005548f4ff156c8a9cee922435c214e24b7a772106c8e840e36edf7776bf2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
048005548f4ff156c8a9cee922435c214e24b7a772106c8e840e36edf7776bf2.exe
Resource
win10v2004-20221111-en
General
-
Target
048005548f4ff156c8a9cee922435c214e24b7a772106c8e840e36edf7776bf2.exe
-
Size
230KB
-
MD5
86a1badfd643c574eb49a7e16e541292
-
SHA1
d28c39dde6d6b4ce9bfc4c7f505bc8d02b781852
-
SHA256
048005548f4ff156c8a9cee922435c214e24b7a772106c8e840e36edf7776bf2
-
SHA512
b317a066342c9aaac02f26848ccc2812248491e7ce2ab3fdfc87e3be547ca2eb33f884f63960f10fd4f4780b52cc17766323784203210c30a0872a71cf00cff5
-
SSDEEP
3072:Uh0RMLL2p5PxGbqqwBuYAwVZPYsecXjLptl1A+V+Y700:uLKd57B7LRtTH4+Vl7l
Malware Config
Signatures
-
Detects Smokeloader packer 2 IoCs
resource yara_rule behavioral2/memory/4928-133-0x00000000004E0000-0x00000000004E9000-memory.dmp family_smokeloader behavioral2/memory/1468-143-0x0000000000FE0000-0x0000000000FE7000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 3380 ED04.exe -
Uses the VBS compiler for execution 1 TTPs
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 048005548f4ff156c8a9cee922435c214e24b7a772106c8e840e36edf7776bf2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 048005548f4ff156c8a9cee922435c214e24b7a772106c8e840e36edf7776bf2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 048005548f4ff156c8a9cee922435c214e24b7a772106c8e840e36edf7776bf2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4928 048005548f4ff156c8a9cee922435c214e24b7a772106c8e840e36edf7776bf2.exe 4928 048005548f4ff156c8a9cee922435c214e24b7a772106c8e840e36edf7776bf2.exe 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 704 Process not Found -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 4928 048005548f4ff156c8a9cee922435c214e24b7a772106c8e840e36edf7776bf2.exe 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found 704 Process not Found -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 704 wrote to memory of 3380 704 Process not Found 87 PID 704 wrote to memory of 3380 704 Process not Found 87 PID 704 wrote to memory of 3380 704 Process not Found 87 PID 704 wrote to memory of 1468 704 Process not Found 88 PID 704 wrote to memory of 1468 704 Process not Found 88 PID 704 wrote to memory of 1468 704 Process not Found 88 PID 704 wrote to memory of 1468 704 Process not Found 88 PID 704 wrote to memory of 3520 704 Process not Found 89 PID 704 wrote to memory of 3520 704 Process not Found 89 PID 704 wrote to memory of 3520 704 Process not Found 89 PID 3380 wrote to memory of 1516 3380 ED04.exe 90 PID 3380 wrote to memory of 1516 3380 ED04.exe 90 PID 3380 wrote to memory of 1516 3380 ED04.exe 90 PID 3380 wrote to memory of 3780 3380 ED04.exe 91 PID 3380 wrote to memory of 3780 3380 ED04.exe 91 PID 3380 wrote to memory of 3780 3380 ED04.exe 91 PID 3380 wrote to memory of 2172 3380 ED04.exe 92 PID 3380 wrote to memory of 2172 3380 ED04.exe 92 PID 3380 wrote to memory of 2172 3380 ED04.exe 92 PID 3380 wrote to memory of 4656 3380 ED04.exe 93 PID 3380 wrote to memory of 4656 3380 ED04.exe 93 PID 3380 wrote to memory of 4656 3380 ED04.exe 93 PID 704 wrote to memory of 3756 704 Process not Found 94 PID 704 wrote to memory of 3756 704 Process not Found 94 PID 704 wrote to memory of 3756 704 Process not Found 94 PID 704 wrote to memory of 3756 704 Process not Found 94 PID 704 wrote to memory of 1172 704 Process not Found 95 PID 704 wrote to memory of 1172 704 Process not Found 95 PID 704 wrote to memory of 1172 704 Process not Found 95 PID 704 wrote to memory of 792 704 Process not Found 96 PID 704 wrote to memory of 792 704 Process not Found 96 PID 704 wrote to memory of 792 704 Process not Found 96 PID 704 wrote to memory of 792 704 Process not Found 96 PID 704 wrote to memory of 4296 704 Process not Found 97 PID 704 wrote to memory of 4296 704 Process not Found 97 PID 704 wrote to memory of 4296 704 Process not Found 97 PID 704 wrote to memory of 4296 704 Process not Found 97 PID 704 wrote to memory of 4256 704 Process not Found 98 PID 704 wrote to memory of 4256 704 Process not Found 98 PID 704 wrote to memory of 4256 704 Process not Found 98 PID 704 wrote to memory of 4256 704 Process not Found 98 PID 704 wrote to memory of 1564 704 Process not Found 99 PID 704 wrote to memory of 1564 704 Process not Found 99 PID 704 wrote to memory of 1564 704 Process not Found 99 PID 704 wrote to memory of 2012 704 Process not Found 100 PID 704 wrote to memory of 2012 704 Process not Found 100 PID 704 wrote to memory of 2012 704 Process not Found 100 PID 704 wrote to memory of 2012 704 Process not Found 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\048005548f4ff156c8a9cee922435c214e24b7a772106c8e840e36edf7776bf2.exe"C:\Users\Admin\AppData\Local\Temp\048005548f4ff156c8a9cee922435c214e24b7a772106c8e840e36edf7776bf2.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4928
-
C:\Users\Admin\AppData\Local\Temp\ED04.exeC:\Users\Admin\AppData\Local\Temp\ED04.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:1516
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:3780
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:2172
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:4656
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1468
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3520
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3756
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1172
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:792
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4296
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4256
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1564
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5666d8f33d37064fd5d14e2166c9bfa69
SHA13b27df9335a9b2efe9da1057e9f8312a72d1ca9d
SHA2567fddf1b75f50d43214867f367223f2d241d62ae63deea334d051c0ee19d18157
SHA512ac3c993f019bb402db474fda65d587ae7717725eea9b3a869acd3530543b7b94d354f19474f6b1c7fc760b5b22622328def2bef26e3900c186b16e8a3d3b90df
-
Filesize
67KB
MD5666d8f33d37064fd5d14e2166c9bfa69
SHA13b27df9335a9b2efe9da1057e9f8312a72d1ca9d
SHA2567fddf1b75f50d43214867f367223f2d241d62ae63deea334d051c0ee19d18157
SHA512ac3c993f019bb402db474fda65d587ae7717725eea9b3a869acd3530543b7b94d354f19474f6b1c7fc760b5b22622328def2bef26e3900c186b16e8a3d3b90df