Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2022, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
288KB
-
MD5
832d206dead5aa4cdf20e6efd3048c25
-
SHA1
a0d17fd5b88be42edccaace0fb641a092afdb067
-
SHA256
0c0423483302f7f135d822e1262b6a187c735e65fb2372b7d49cd4d8f5b6356b
-
SHA512
af618c979c410b92e409a575bf82c1675a1be07649298e7ce5c0fcc02f90d82f838b96b4660d26bccc4e4d52c328178f2f0b779e956b5efc3d53b022ce326470
-
SSDEEP
3072:HYdKY9HuLTC1eqoRfALE4FVwSZEiJNLQnyPT+8U9SkEqwi:LqOLoeqqV4FVw/++nyPS8UIkEq
Malware Config
Signatures
-
Detects Smokeloader packer 6 IoCs
resource yara_rule behavioral2/memory/2180-133-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/4604-135-0x00000000006C0000-0x00000000006C9000-memory.dmp family_smokeloader behavioral2/memory/2180-136-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/2180-137-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/3708-168-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/3708-169-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 5036 cwtjrai 3708 cwtjrai -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4604 set thread context of 2180 4604 file.exe 84 PID 5036 set thread context of 3708 5036 cwtjrai 91 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cwtjrai Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cwtjrai Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cwtjrai Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2180 file.exe 2180 file.exe 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found 2764 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2764 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2180 file.exe 3708 cwtjrai -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 2764 Process not Found Token: SeCreatePagefilePrivilege 2764 Process not Found Token: SeShutdownPrivilege 2764 Process not Found Token: SeCreatePagefilePrivilege 2764 Process not Found Token: SeShutdownPrivilege 2764 Process not Found Token: SeCreatePagefilePrivilege 2764 Process not Found Token: SeShutdownPrivilege 2764 Process not Found Token: SeCreatePagefilePrivilege 2764 Process not Found Token: SeShutdownPrivilege 2764 Process not Found Token: SeCreatePagefilePrivilege 2764 Process not Found Token: SeShutdownPrivilege 2764 Process not Found Token: SeCreatePagefilePrivilege 2764 Process not Found Token: SeShutdownPrivilege 2764 Process not Found Token: SeCreatePagefilePrivilege 2764 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4604 wrote to memory of 2180 4604 file.exe 84 PID 4604 wrote to memory of 2180 4604 file.exe 84 PID 4604 wrote to memory of 2180 4604 file.exe 84 PID 4604 wrote to memory of 2180 4604 file.exe 84 PID 4604 wrote to memory of 2180 4604 file.exe 84 PID 4604 wrote to memory of 2180 4604 file.exe 84 PID 5036 wrote to memory of 3708 5036 cwtjrai 91 PID 5036 wrote to memory of 3708 5036 cwtjrai 91 PID 5036 wrote to memory of 3708 5036 cwtjrai 91 PID 5036 wrote to memory of 3708 5036 cwtjrai 91 PID 5036 wrote to memory of 3708 5036 cwtjrai 91 PID 5036 wrote to memory of 3708 5036 cwtjrai 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2180
-
-
C:\Users\Admin\AppData\Roaming\cwtjraiC:\Users\Admin\AppData\Roaming\cwtjrai1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Roaming\cwtjraiC:\Users\Admin\AppData\Roaming\cwtjrai2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3708
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD5832d206dead5aa4cdf20e6efd3048c25
SHA1a0d17fd5b88be42edccaace0fb641a092afdb067
SHA2560c0423483302f7f135d822e1262b6a187c735e65fb2372b7d49cd4d8f5b6356b
SHA512af618c979c410b92e409a575bf82c1675a1be07649298e7ce5c0fcc02f90d82f838b96b4660d26bccc4e4d52c328178f2f0b779e956b5efc3d53b022ce326470
-
Filesize
288KB
MD5832d206dead5aa4cdf20e6efd3048c25
SHA1a0d17fd5b88be42edccaace0fb641a092afdb067
SHA2560c0423483302f7f135d822e1262b6a187c735e65fb2372b7d49cd4d8f5b6356b
SHA512af618c979c410b92e409a575bf82c1675a1be07649298e7ce5c0fcc02f90d82f838b96b4660d26bccc4e4d52c328178f2f0b779e956b5efc3d53b022ce326470
-
Filesize
288KB
MD5832d206dead5aa4cdf20e6efd3048c25
SHA1a0d17fd5b88be42edccaace0fb641a092afdb067
SHA2560c0423483302f7f135d822e1262b6a187c735e65fb2372b7d49cd4d8f5b6356b
SHA512af618c979c410b92e409a575bf82c1675a1be07649298e7ce5c0fcc02f90d82f838b96b4660d26bccc4e4d52c328178f2f0b779e956b5efc3d53b022ce326470