Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2023 05:40
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
207KB
-
MD5
e61bd1023de1c935149a998c33ae9f37
-
SHA1
f06f36974c483508c0616b5de63aa70472358b14
-
SHA256
1ce27fdc5a5869835ceaef65c07fc5cf0165d373aa9cae89a5f713d7d704fc29
-
SHA512
81999880f516b3b6b2ff584e4e8ae4b70e33fe2fcfb0ac15b8f3397e88666e1985d0b62a5660a32c5f6718ef374fa338a92be961dbf586c2a10d3fc9f3d8f475
-
SSDEEP
3072:ZXNhbS3y+k+BFCJ5vGgdBmRVDb5Lk3O5+n/06Pwx7apb:9fgy+k+uzPMRVDb58u6Pzp
Malware Config
Extracted
lumma
77.73.134.68
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4640-133-0x0000000002CF0000-0x0000000002CF9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
8491.exepid process 2636 8491.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1880 2636 WerFault.exe 8491.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
file.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
file.exepid process 4640 file.exe 4640 file.exe 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2644 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
file.exepid process 4640 file.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 2644 Token: SeCreatePagefilePrivilege 2644 Token: SeShutdownPrivilege 2644 Token: SeCreatePagefilePrivilege 2644 Token: SeShutdownPrivilege 2644 Token: SeCreatePagefilePrivilege 2644 Token: SeShutdownPrivilege 2644 Token: SeCreatePagefilePrivilege 2644 Token: SeShutdownPrivilege 2644 Token: SeCreatePagefilePrivilege 2644 Token: SeShutdownPrivilege 2644 Token: SeCreatePagefilePrivilege 2644 Token: SeShutdownPrivilege 2644 Token: SeCreatePagefilePrivilege 2644 -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
description pid process target process PID 2644 wrote to memory of 2636 2644 8491.exe PID 2644 wrote to memory of 2636 2644 8491.exe PID 2644 wrote to memory of 2636 2644 8491.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4640
-
C:\Users\Admin\AppData\Local\Temp\8491.exeC:\Users\Admin\AppData\Local\Temp\8491.exe1⤵
- Executes dropped EXE
PID:2636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 13362⤵
- Program crash
PID:1880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2636 -ip 26361⤵PID:3444
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245KB
MD5f39ffa9812c55774a4dd1451b23fa2d4
SHA1f9f60ac20bfe819d2a012d0fb19e88ea4e4a348d
SHA256758601b7d2c4c1c3ba050f4c9b0fd65f31f8d411965e2529ee22af93623f4148
SHA512d35209af1f3ed8f0249bc14f70b9c6e95e88abc5c7d10d9e906761a09b98731c1279f87bae9699158e65e07e55e7f6a9d71be0dc9c4a6f07c529d2a668266b13
-
Filesize
245KB
MD5f39ffa9812c55774a4dd1451b23fa2d4
SHA1f9f60ac20bfe819d2a012d0fb19e88ea4e4a348d
SHA256758601b7d2c4c1c3ba050f4c9b0fd65f31f8d411965e2529ee22af93623f4148
SHA512d35209af1f3ed8f0249bc14f70b9c6e95e88abc5c7d10d9e906761a09b98731c1279f87bae9699158e65e07e55e7f6a9d71be0dc9c4a6f07c529d2a668266b13