Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/01/2023, 00:48

General

  • Target

    e756885f12abdf5cc8450232691a4f55c1e524262825a4a00ced4f004a2c69c1.exe

  • Size

    187KB

  • MD5

    b32fab896f5e701c1e816cd8c31c0ff5

  • SHA1

    475ed088fefe3ac3ccaf4c38868048fa7ed8ca8b

  • SHA256

    e756885f12abdf5cc8450232691a4f55c1e524262825a4a00ced4f004a2c69c1

  • SHA512

    22ed1a9afc6caca896bee0c77d0dacb9c28747986566e176cdeb72b8cb3429323d73c5da795905a08941fa480e2e690d45edf8ce7efee4a77f5ba4c5442002d0

  • SSDEEP

    3072:caznLhnVkFqK5IMtAzIGAX+RjpkWiE5MrrIAwo3Zhxeh:DLoFqBMtnXYb5M/X7rC

Malware Config

Signatures

  • Detects Smokeloader packer 6 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e756885f12abdf5cc8450232691a4f55c1e524262825a4a00ced4f004a2c69c1.exe
    "C:\Users\Admin\AppData\Local\Temp\e756885f12abdf5cc8450232691a4f55c1e524262825a4a00ced4f004a2c69c1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Users\Admin\AppData\Local\Temp\e756885f12abdf5cc8450232691a4f55c1e524262825a4a00ced4f004a2c69c1.exe
      "C:\Users\Admin\AppData\Local\Temp\e756885f12abdf5cc8450232691a4f55c1e524262825a4a00ced4f004a2c69c1.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:956
  • C:\Users\Admin\AppData\Roaming\tabhavb
    C:\Users\Admin\AppData\Roaming\tabhavb
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:5080
    • C:\Users\Admin\AppData\Roaming\tabhavb
      C:\Users\Admin\AppData\Roaming\tabhavb
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:620

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\tabhavb

    Filesize

    187KB

    MD5

    b32fab896f5e701c1e816cd8c31c0ff5

    SHA1

    475ed088fefe3ac3ccaf4c38868048fa7ed8ca8b

    SHA256

    e756885f12abdf5cc8450232691a4f55c1e524262825a4a00ced4f004a2c69c1

    SHA512

    22ed1a9afc6caca896bee0c77d0dacb9c28747986566e176cdeb72b8cb3429323d73c5da795905a08941fa480e2e690d45edf8ce7efee4a77f5ba4c5442002d0

  • C:\Users\Admin\AppData\Roaming\tabhavb

    Filesize

    187KB

    MD5

    b32fab896f5e701c1e816cd8c31c0ff5

    SHA1

    475ed088fefe3ac3ccaf4c38868048fa7ed8ca8b

    SHA256

    e756885f12abdf5cc8450232691a4f55c1e524262825a4a00ced4f004a2c69c1

    SHA512

    22ed1a9afc6caca896bee0c77d0dacb9c28747986566e176cdeb72b8cb3429323d73c5da795905a08941fa480e2e690d45edf8ce7efee4a77f5ba4c5442002d0

  • C:\Users\Admin\AppData\Roaming\tabhavb

    Filesize

    187KB

    MD5

    b32fab896f5e701c1e816cd8c31c0ff5

    SHA1

    475ed088fefe3ac3ccaf4c38868048fa7ed8ca8b

    SHA256

    e756885f12abdf5cc8450232691a4f55c1e524262825a4a00ced4f004a2c69c1

    SHA512

    22ed1a9afc6caca896bee0c77d0dacb9c28747986566e176cdeb72b8cb3429323d73c5da795905a08941fa480e2e690d45edf8ce7efee4a77f5ba4c5442002d0

  • memory/620-190-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/620-189-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/956-133-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/956-136-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/956-137-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1048-171-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-178-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-143-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-144-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-145-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-146-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-147-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-148-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-149-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-150-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-151-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-152-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-153-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-154-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-155-0x0000000007ED0000-0x0000000007EE0000-memory.dmp

    Filesize

    64KB

  • memory/1048-156-0x0000000007EF0000-0x0000000007F00000-memory.dmp

    Filesize

    64KB

  • memory/1048-157-0x0000000007EF0000-0x0000000007F00000-memory.dmp

    Filesize

    64KB

  • memory/1048-158-0x0000000007EF0000-0x0000000007F00000-memory.dmp

    Filesize

    64KB

  • memory/1048-159-0x0000000007EF0000-0x0000000007F00000-memory.dmp

    Filesize

    64KB

  • memory/1048-160-0x0000000007EF0000-0x0000000007F00000-memory.dmp

    Filesize

    64KB

  • memory/1048-161-0x0000000007EF0000-0x0000000007F00000-memory.dmp

    Filesize

    64KB

  • memory/1048-162-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-163-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-164-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-165-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-167-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-166-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-168-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-169-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-170-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-141-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-172-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-173-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-174-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-175-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-176-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-177-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-142-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-179-0x0000000000BD0000-0x0000000000BE0000-memory.dmp

    Filesize

    64KB

  • memory/1048-140-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-180-0x0000000000BE0000-0x0000000000BF0000-memory.dmp

    Filesize

    64KB

  • memory/1048-181-0x0000000000BE0000-0x0000000000BF0000-memory.dmp

    Filesize

    64KB

  • memory/1048-182-0x0000000000BE0000-0x0000000000BF0000-memory.dmp

    Filesize

    64KB

  • memory/1048-215-0x0000000000C20000-0x0000000000C30000-memory.dmp

    Filesize

    64KB

  • memory/1048-214-0x0000000000C20000-0x0000000000C30000-memory.dmp

    Filesize

    64KB

  • memory/1048-213-0x0000000000C20000-0x0000000000C30000-memory.dmp

    Filesize

    64KB

  • memory/1048-139-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-138-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-191-0x0000000000BD0000-0x0000000000BE0000-memory.dmp

    Filesize

    64KB

  • memory/1048-192-0x0000000000BE0000-0x0000000000BF0000-memory.dmp

    Filesize

    64KB

  • memory/1048-193-0x0000000000BE0000-0x0000000000BF0000-memory.dmp

    Filesize

    64KB

  • memory/1048-194-0x0000000000BE0000-0x0000000000BF0000-memory.dmp

    Filesize

    64KB

  • memory/1048-195-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-196-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-197-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-198-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-199-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-200-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-201-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-202-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-203-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-204-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-205-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-206-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-207-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-208-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-209-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-210-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-211-0x0000000007F00000-0x0000000007F10000-memory.dmp

    Filesize

    64KB

  • memory/1048-212-0x0000000000BF0000-0x0000000000C00000-memory.dmp

    Filesize

    64KB

  • memory/1304-135-0x0000000002040000-0x0000000002049000-memory.dmp

    Filesize

    36KB

  • memory/1304-134-0x0000000000488000-0x0000000000498000-memory.dmp

    Filesize

    64KB

  • memory/5080-188-0x00000000007F9000-0x0000000000809000-memory.dmp

    Filesize

    64KB