Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
15-01-2023 17:15
Static task
static1
General
-
Target
987fed2dae35dedc1c52230b9938c2a351164d84e8874c8314957812ad641bdb.exe
-
Size
211KB
-
MD5
02f3b25318b1cc3c6a24ad7a1738eede
-
SHA1
43182925664314e2fea57cc3daf719568385e6e0
-
SHA256
987fed2dae35dedc1c52230b9938c2a351164d84e8874c8314957812ad641bdb
-
SHA512
356f503151db78a98a2d309b1636693d71e814b3bd4c9ba3b4e6d8955ab6afede0e39c2517e9da03cd2047bdab046a4fdb5b49548f36a160030953e97f20e94c
-
SSDEEP
3072:CXjrZwbg56Ks5RIZEyS5VDnrqKxyeqLzy5mi:C6yZHSDnuKcn
Malware Config
Extracted
lumma
77.73.134.68
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2888-143-0x0000000002D00000-0x0000000002D09000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
4ECC.exepid process 2124 4ECC.exe -
Deletes itself 1 IoCs
Processes:
pid process 3028 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
987fed2dae35dedc1c52230b9938c2a351164d84e8874c8314957812ad641bdb.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987fed2dae35dedc1c52230b9938c2a351164d84e8874c8314957812ad641bdb.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987fed2dae35dedc1c52230b9938c2a351164d84e8874c8314957812ad641bdb.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987fed2dae35dedc1c52230b9938c2a351164d84e8874c8314957812ad641bdb.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
987fed2dae35dedc1c52230b9938c2a351164d84e8874c8314957812ad641bdb.exepid process 2888 987fed2dae35dedc1c52230b9938c2a351164d84e8874c8314957812ad641bdb.exe 2888 987fed2dae35dedc1c52230b9938c2a351164d84e8874c8314957812ad641bdb.exe 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3028 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
987fed2dae35dedc1c52230b9938c2a351164d84e8874c8314957812ad641bdb.exepid process 2888 987fed2dae35dedc1c52230b9938c2a351164d84e8874c8314957812ad641bdb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
description pid process target process PID 3028 wrote to memory of 2124 3028 4ECC.exe PID 3028 wrote to memory of 2124 3028 4ECC.exe PID 3028 wrote to memory of 2124 3028 4ECC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\987fed2dae35dedc1c52230b9938c2a351164d84e8874c8314957812ad641bdb.exe"C:\Users\Admin\AppData\Local\Temp\987fed2dae35dedc1c52230b9938c2a351164d84e8874c8314957812ad641bdb.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2888
-
C:\Users\Admin\AppData\Local\Temp\4ECC.exeC:\Users\Admin\AppData\Local\Temp\4ECC.exe1⤵
- Executes dropped EXE
PID:2124
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD5b7a88887e20e7658af423615d1399590
SHA1c88ed903fb0cddcf2eba4f0437c476ab34fadf59
SHA2566ebac5146cf168228e348df9f3f1006dc0f9ee26021ac18c8a6b572da174b182
SHA5121f96bb4a1739e921a75a7573d5649e5981ffd4ad51eb3712fa88fa8418109d3a69a3937135d00179790db0165a88f408c7fa2671c394da499c75e1b781b1b1c7
-
Filesize
248KB
MD5b7a88887e20e7658af423615d1399590
SHA1c88ed903fb0cddcf2eba4f0437c476ab34fadf59
SHA2566ebac5146cf168228e348df9f3f1006dc0f9ee26021ac18c8a6b572da174b182
SHA5121f96bb4a1739e921a75a7573d5649e5981ffd4ad51eb3712fa88fa8418109d3a69a3937135d00179790db0165a88f408c7fa2671c394da499c75e1b781b1b1c7