Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2022 11:19
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
326KB
-
MD5
aa6417cc143629256d8045cb65aa2340
-
SHA1
474d58345d874b010002cb48668ada6d2cd0bc6a
-
SHA256
356ed7fc60d88e7f4aa9ae44e4de969c83e572b529a1a8823d0d172834ce7b80
-
SHA512
cbae47b640302da0e02febfe790294fbc99973d43430a8586326ebadf80c7a811e0d0e6c3f78559ba0ad72ea0652d4391bba16c9d4041afd3552e11fdbfd285c
-
SSDEEP
6144:3UjFLlAw4KZsbtQmhmoA1+UyBmYf67k13bwZ4Vxq:EpJApKgNZcBfYy7
Malware Config
Signatures
-
Detects Smokeloader packer 6 IoCs
resource yara_rule behavioral2/memory/3364-133-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/4296-135-0x00000000004E0000-0x00000000004E9000-memory.dmp family_smokeloader behavioral2/memory/3364-136-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/3364-137-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/1716-144-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/1716-145-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 3064 hgafejv 1716 hgafejv -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4296 set thread context of 3364 4296 file.exe 79 PID 3064 set thread context of 1716 3064 hgafejv 88 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hgafejv Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hgafejv Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hgafejv -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3364 file.exe 3364 file.exe 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found 2184 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2184 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3364 file.exe 1716 hgafejv -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2184 Process not Found Token: SeCreatePagefilePrivilege 2184 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4296 wrote to memory of 3364 4296 file.exe 79 PID 4296 wrote to memory of 3364 4296 file.exe 79 PID 4296 wrote to memory of 3364 4296 file.exe 79 PID 4296 wrote to memory of 3364 4296 file.exe 79 PID 4296 wrote to memory of 3364 4296 file.exe 79 PID 4296 wrote to memory of 3364 4296 file.exe 79 PID 3064 wrote to memory of 1716 3064 hgafejv 88 PID 3064 wrote to memory of 1716 3064 hgafejv 88 PID 3064 wrote to memory of 1716 3064 hgafejv 88 PID 3064 wrote to memory of 1716 3064 hgafejv 88 PID 3064 wrote to memory of 1716 3064 hgafejv 88 PID 3064 wrote to memory of 1716 3064 hgafejv 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3364
-
-
C:\Users\Admin\AppData\Roaming\hgafejvC:\Users\Admin\AppData\Roaming\hgafejv1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Roaming\hgafejvC:\Users\Admin\AppData\Roaming\hgafejv2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1716
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
326KB
MD5aa6417cc143629256d8045cb65aa2340
SHA1474d58345d874b010002cb48668ada6d2cd0bc6a
SHA256356ed7fc60d88e7f4aa9ae44e4de969c83e572b529a1a8823d0d172834ce7b80
SHA512cbae47b640302da0e02febfe790294fbc99973d43430a8586326ebadf80c7a811e0d0e6c3f78559ba0ad72ea0652d4391bba16c9d4041afd3552e11fdbfd285c
-
Filesize
326KB
MD5aa6417cc143629256d8045cb65aa2340
SHA1474d58345d874b010002cb48668ada6d2cd0bc6a
SHA256356ed7fc60d88e7f4aa9ae44e4de969c83e572b529a1a8823d0d172834ce7b80
SHA512cbae47b640302da0e02febfe790294fbc99973d43430a8586326ebadf80c7a811e0d0e6c3f78559ba0ad72ea0652d4391bba16c9d4041afd3552e11fdbfd285c
-
Filesize
326KB
MD5aa6417cc143629256d8045cb65aa2340
SHA1474d58345d874b010002cb48668ada6d2cd0bc6a
SHA256356ed7fc60d88e7f4aa9ae44e4de969c83e572b529a1a8823d0d172834ce7b80
SHA512cbae47b640302da0e02febfe790294fbc99973d43430a8586326ebadf80c7a811e0d0e6c3f78559ba0ad72ea0652d4391bba16c9d4041afd3552e11fdbfd285c