Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/01/2023, 13:05

General

  • Target

    8a29e1c6c28c4124ac50b1dd1424ad8e7316eff59cb4b9a6dcafb9556aee4d64.exe

  • Size

    216KB

  • MD5

    fb7d814cdf9ff8996c0137037063a492

  • SHA1

    26cb20e585f39ce0f48426dbabe4fb2f9056c6db

  • SHA256

    8a29e1c6c28c4124ac50b1dd1424ad8e7316eff59cb4b9a6dcafb9556aee4d64

  • SHA512

    2ae85f076053d65aa56e2150b3b3bbb386c0f3d8956ec5ba0bfba6550640a0c416fad3ccad3e0ad150fd0b708617e28d872cb644a0502edd731199a3b28a57e2

  • SSDEEP

    3072:vXcb/MeLQu3Mh07St57T5A5/Fr+8wTHBRTXId/1fW6:fIZL37SbTGXS8kLQr

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a29e1c6c28c4124ac50b1dd1424ad8e7316eff59cb4b9a6dcafb9556aee4d64.exe
    "C:\Users\Admin\AppData\Local\Temp\8a29e1c6c28c4124ac50b1dd1424ad8e7316eff59cb4b9a6dcafb9556aee4d64.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4336
  • C:\Windows\SysWOW64\explorer.exe
    C:\Windows\SysWOW64\explorer.exe
    1⤵
      PID:3528
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      1⤵
        PID:3648
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        1⤵
          PID:4944
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe
          1⤵
            PID:1020
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            1⤵
              PID:4372
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              1⤵
                PID:3824
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:4140
                • C:\Windows\explorer.exe
                  C:\Windows\explorer.exe
                  1⤵
                    PID:3308
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:3288

                    Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • memory/1020-147-0x0000000000D00000-0x0000000000D0C000-memory.dmp

                      Filesize

                      48KB

                    • memory/1020-146-0x0000000000D10000-0x0000000000D16000-memory.dmp

                      Filesize

                      24KB

                    • memory/3288-169-0x0000000000960000-0x0000000000968000-memory.dmp

                      Filesize

                      32KB

                    • memory/3288-162-0x0000000000950000-0x000000000095B000-memory.dmp

                      Filesize

                      44KB

                    • memory/3288-161-0x0000000000960000-0x0000000000968000-memory.dmp

                      Filesize

                      32KB

                    • memory/3308-159-0x0000000000C00000-0x0000000000C0D000-memory.dmp

                      Filesize

                      52KB

                    • memory/3308-158-0x0000000000C10000-0x0000000000C17000-memory.dmp

                      Filesize

                      28KB

                    • memory/3528-139-0x0000000001000000-0x000000000100B000-memory.dmp

                      Filesize

                      44KB

                    • memory/3528-138-0x0000000001010000-0x0000000001017000-memory.dmp

                      Filesize

                      28KB

                    • memory/3528-163-0x0000000001010000-0x0000000001017000-memory.dmp

                      Filesize

                      28KB

                    • memory/3648-141-0x0000000000FD0000-0x0000000000FDF000-memory.dmp

                      Filesize

                      60KB

                    • memory/3648-140-0x0000000000FE0000-0x0000000000FE9000-memory.dmp

                      Filesize

                      36KB

                    • memory/3648-164-0x0000000000FE0000-0x0000000000FE9000-memory.dmp

                      Filesize

                      36KB

                    • memory/3824-167-0x0000000000960000-0x0000000000965000-memory.dmp

                      Filesize

                      20KB

                    • memory/3824-152-0x0000000000960000-0x0000000000965000-memory.dmp

                      Filesize

                      20KB

                    • memory/3824-153-0x0000000000950000-0x0000000000959000-memory.dmp

                      Filesize

                      36KB

                    • memory/4140-168-0x0000000000960000-0x0000000000966000-memory.dmp

                      Filesize

                      24KB

                    • memory/4140-155-0x0000000000960000-0x0000000000966000-memory.dmp

                      Filesize

                      24KB

                    • memory/4140-156-0x0000000000950000-0x000000000095B000-memory.dmp

                      Filesize

                      44KB

                    • memory/4336-135-0x0000000000400000-0x0000000000453000-memory.dmp

                      Filesize

                      332KB

                    • memory/4336-132-0x00000000006D8000-0x00000000006E9000-memory.dmp

                      Filesize

                      68KB

                    • memory/4336-134-0x0000000000400000-0x0000000000453000-memory.dmp

                      Filesize

                      332KB

                    • memory/4336-133-0x00000000005E0000-0x00000000005E9000-memory.dmp

                      Filesize

                      36KB

                    • memory/4372-150-0x0000000000950000-0x0000000000977000-memory.dmp

                      Filesize

                      156KB

                    • memory/4372-166-0x0000000000980000-0x00000000009A2000-memory.dmp

                      Filesize

                      136KB

                    • memory/4372-149-0x0000000000980000-0x00000000009A2000-memory.dmp

                      Filesize

                      136KB

                    • memory/4944-143-0x00000000003C0000-0x00000000003C5000-memory.dmp

                      Filesize

                      20KB

                    • memory/4944-144-0x00000000003B0000-0x00000000003B9000-memory.dmp

                      Filesize

                      36KB

                    • memory/4944-165-0x00000000003C0000-0x00000000003C5000-memory.dmp

                      Filesize

                      20KB