Analysis
-
max time kernel
150s -
max time network
73s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
02-01-2023 22:40
Static task
static1
Behavioral task
behavioral1
Sample
79258a91193e598bda2bda0c75f957bc695cdd8c40448ec7b49609d1c27aebdb.exe
Resource
win10-20220812-en
windows10-1703-x64
9 signatures
150 seconds
General
-
Target
79258a91193e598bda2bda0c75f957bc695cdd8c40448ec7b49609d1c27aebdb.exe
-
Size
195KB
-
MD5
1bef6c2691cfbc12015ced39bec0cf3b
-
SHA1
5f3e1977e9d33b016730f33dde4a579fcb90df6e
-
SHA256
79258a91193e598bda2bda0c75f957bc695cdd8c40448ec7b49609d1c27aebdb
-
SHA512
32dec1d210b636779451156c776fa2c0b525a04e50574438715990eae1884d93b77dfe487f1dc69161d796113526c4f524aa7b7634ff324fef7dbeeb056e3f10
-
SSDEEP
3072:XX5F2zO9GLgC1XdMxo5qaFfP1lcr7tmDhfg4DmZhLP:H9YLBdM3iP1lcr7tCftG
Score
10/10
Malware Config
Signatures
-
Detects Smokeloader packer 5 IoCs
resource yara_rule behavioral1/memory/2832-140-0x00000000004A0000-0x00000000004A9000-memory.dmp family_smokeloader behavioral1/memory/3804-145-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3804-146-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/3804-160-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3804-177-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 2336 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2832 set thread context of 3804 2832 79258a91193e598bda2bda0c75f957bc695cdd8c40448ec7b49609d1c27aebdb.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 79258a91193e598bda2bda0c75f957bc695cdd8c40448ec7b49609d1c27aebdb.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 79258a91193e598bda2bda0c75f957bc695cdd8c40448ec7b49609d1c27aebdb.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 79258a91193e598bda2bda0c75f957bc695cdd8c40448ec7b49609d1c27aebdb.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3804 79258a91193e598bda2bda0c75f957bc695cdd8c40448ec7b49609d1c27aebdb.exe 3804 79258a91193e598bda2bda0c75f957bc695cdd8c40448ec7b49609d1c27aebdb.exe 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found 2336 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2336 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3804 79258a91193e598bda2bda0c75f957bc695cdd8c40448ec7b49609d1c27aebdb.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2832 wrote to memory of 3804 2832 79258a91193e598bda2bda0c75f957bc695cdd8c40448ec7b49609d1c27aebdb.exe 66 PID 2832 wrote to memory of 3804 2832 79258a91193e598bda2bda0c75f957bc695cdd8c40448ec7b49609d1c27aebdb.exe 66 PID 2832 wrote to memory of 3804 2832 79258a91193e598bda2bda0c75f957bc695cdd8c40448ec7b49609d1c27aebdb.exe 66 PID 2832 wrote to memory of 3804 2832 79258a91193e598bda2bda0c75f957bc695cdd8c40448ec7b49609d1c27aebdb.exe 66 PID 2832 wrote to memory of 3804 2832 79258a91193e598bda2bda0c75f957bc695cdd8c40448ec7b49609d1c27aebdb.exe 66 PID 2832 wrote to memory of 3804 2832 79258a91193e598bda2bda0c75f957bc695cdd8c40448ec7b49609d1c27aebdb.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\79258a91193e598bda2bda0c75f957bc695cdd8c40448ec7b49609d1c27aebdb.exe"C:\Users\Admin\AppData\Local\Temp\79258a91193e598bda2bda0c75f957bc695cdd8c40448ec7b49609d1c27aebdb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\79258a91193e598bda2bda0c75f957bc695cdd8c40448ec7b49609d1c27aebdb.exe"C:\Users\Admin\AppData\Local\Temp\79258a91193e598bda2bda0c75f957bc695cdd8c40448ec7b49609d1c27aebdb.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3804
-