Analysis
-
max time kernel
151s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2023, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
fe494fd1eb6a89b0bcbe69e591ef23cf4a6fecf93c1825a3c548837a92060a75.exe
Resource
win10v2004-20221111-en
General
-
Target
fe494fd1eb6a89b0bcbe69e591ef23cf4a6fecf93c1825a3c548837a92060a75.exe
-
Size
300KB
-
MD5
9e488fef6aabc325e078217326cc61e2
-
SHA1
eaff36de8e2bceef56e9232d067f543fa66dbe1c
-
SHA256
fe494fd1eb6a89b0bcbe69e591ef23cf4a6fecf93c1825a3c548837a92060a75
-
SHA512
f45e111ab78e55318c5e232091bfe7bd5a6544e383a421ec9b450d47fc9b762c56e3342fd161d25058270e9eaee60bc515d5782cc4822b89d071466d8e9da098
-
SSDEEP
6144:HvLhYychejQMvWbbv3Enx8Yf+uHCeI280BJ:HvFYycq58Yf+BS
Malware Config
Signatures
-
Detects Smokeloader packer 6 IoCs
resource yara_rule behavioral1/memory/4484-133-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4912-135-0x0000000002D90000-0x0000000002D99000-memory.dmp family_smokeloader behavioral1/memory/4484-136-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4484-137-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4396-145-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4396-146-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 1008 cwwcwjr 4396 cwwcwjr -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4912 set thread context of 4484 4912 fe494fd1eb6a89b0bcbe69e591ef23cf4a6fecf93c1825a3c548837a92060a75.exe 85 PID 1008 set thread context of 4396 1008 cwwcwjr 91 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fe494fd1eb6a89b0bcbe69e591ef23cf4a6fecf93c1825a3c548837a92060a75.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fe494fd1eb6a89b0bcbe69e591ef23cf4a6fecf93c1825a3c548837a92060a75.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fe494fd1eb6a89b0bcbe69e591ef23cf4a6fecf93c1825a3c548837a92060a75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cwwcwjr Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cwwcwjr Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cwwcwjr -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4484 fe494fd1eb6a89b0bcbe69e591ef23cf4a6fecf93c1825a3c548837a92060a75.exe 4484 fe494fd1eb6a89b0bcbe69e591ef23cf4a6fecf93c1825a3c548837a92060a75.exe 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3020 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4484 fe494fd1eb6a89b0bcbe69e591ef23cf4a6fecf93c1825a3c548837a92060a75.exe 4396 cwwcwjr -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4912 wrote to memory of 4484 4912 fe494fd1eb6a89b0bcbe69e591ef23cf4a6fecf93c1825a3c548837a92060a75.exe 85 PID 4912 wrote to memory of 4484 4912 fe494fd1eb6a89b0bcbe69e591ef23cf4a6fecf93c1825a3c548837a92060a75.exe 85 PID 4912 wrote to memory of 4484 4912 fe494fd1eb6a89b0bcbe69e591ef23cf4a6fecf93c1825a3c548837a92060a75.exe 85 PID 4912 wrote to memory of 4484 4912 fe494fd1eb6a89b0bcbe69e591ef23cf4a6fecf93c1825a3c548837a92060a75.exe 85 PID 4912 wrote to memory of 4484 4912 fe494fd1eb6a89b0bcbe69e591ef23cf4a6fecf93c1825a3c548837a92060a75.exe 85 PID 4912 wrote to memory of 4484 4912 fe494fd1eb6a89b0bcbe69e591ef23cf4a6fecf93c1825a3c548837a92060a75.exe 85 PID 1008 wrote to memory of 4396 1008 cwwcwjr 91 PID 1008 wrote to memory of 4396 1008 cwwcwjr 91 PID 1008 wrote to memory of 4396 1008 cwwcwjr 91 PID 1008 wrote to memory of 4396 1008 cwwcwjr 91 PID 1008 wrote to memory of 4396 1008 cwwcwjr 91 PID 1008 wrote to memory of 4396 1008 cwwcwjr 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe494fd1eb6a89b0bcbe69e591ef23cf4a6fecf93c1825a3c548837a92060a75.exe"C:\Users\Admin\AppData\Local\Temp\fe494fd1eb6a89b0bcbe69e591ef23cf4a6fecf93c1825a3c548837a92060a75.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\fe494fd1eb6a89b0bcbe69e591ef23cf4a6fecf93c1825a3c548837a92060a75.exe"C:\Users\Admin\AppData\Local\Temp\fe494fd1eb6a89b0bcbe69e591ef23cf4a6fecf93c1825a3c548837a92060a75.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4484
-
-
C:\Users\Admin\AppData\Roaming\cwwcwjrC:\Users\Admin\AppData\Roaming\cwwcwjr1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Roaming\cwwcwjrC:\Users\Admin\AppData\Roaming\cwwcwjr2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4396
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300KB
MD59e488fef6aabc325e078217326cc61e2
SHA1eaff36de8e2bceef56e9232d067f543fa66dbe1c
SHA256fe494fd1eb6a89b0bcbe69e591ef23cf4a6fecf93c1825a3c548837a92060a75
SHA512f45e111ab78e55318c5e232091bfe7bd5a6544e383a421ec9b450d47fc9b762c56e3342fd161d25058270e9eaee60bc515d5782cc4822b89d071466d8e9da098
-
Filesize
300KB
MD59e488fef6aabc325e078217326cc61e2
SHA1eaff36de8e2bceef56e9232d067f543fa66dbe1c
SHA256fe494fd1eb6a89b0bcbe69e591ef23cf4a6fecf93c1825a3c548837a92060a75
SHA512f45e111ab78e55318c5e232091bfe7bd5a6544e383a421ec9b450d47fc9b762c56e3342fd161d25058270e9eaee60bc515d5782cc4822b89d071466d8e9da098
-
Filesize
300KB
MD59e488fef6aabc325e078217326cc61e2
SHA1eaff36de8e2bceef56e9232d067f543fa66dbe1c
SHA256fe494fd1eb6a89b0bcbe69e591ef23cf4a6fecf93c1825a3c548837a92060a75
SHA512f45e111ab78e55318c5e232091bfe7bd5a6544e383a421ec9b450d47fc9b762c56e3342fd161d25058270e9eaee60bc515d5782cc4822b89d071466d8e9da098