Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2023 18:19
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
General
-
Target
file.exe
-
Size
211KB
-
MD5
02f3b25318b1cc3c6a24ad7a1738eede
-
SHA1
43182925664314e2fea57cc3daf719568385e6e0
-
SHA256
987fed2dae35dedc1c52230b9938c2a351164d84e8874c8314957812ad641bdb
-
SHA512
356f503151db78a98a2d309b1636693d71e814b3bd4c9ba3b4e6d8955ab6afede0e39c2517e9da03cd2047bdab046a4fdb5b49548f36a160030953e97f20e94c
-
SSDEEP
3072:CXjrZwbg56Ks5RIZEyS5VDnrqKxyeqLzy5mi:C6yZHSDnuKcn
Malware Config
Extracted
lumma
77.73.134.68
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4612-133-0x0000000002C30000-0x0000000002C39000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
ucvriebBACF.exepid process 4768 ucvrieb 2832 BACF.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
file.exeucvriebdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ucvrieb Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ucvrieb Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ucvrieb -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
file.exepid process 4612 file.exe 4612 file.exe 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 2424 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2424 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
file.exeucvriebpid process 4612 file.exe 4768 ucvrieb -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
description pid process target process PID 2424 wrote to memory of 2832 2424 BACF.exe PID 2424 wrote to memory of 2832 2424 BACF.exe PID 2424 wrote to memory of 2832 2424 BACF.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4612
-
C:\Users\Admin\AppData\Roaming\ucvriebC:\Users\Admin\AppData\Roaming\ucvrieb1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4768
-
C:\Users\Admin\AppData\Local\Temp\BACF.exeC:\Users\Admin\AppData\Local\Temp\BACF.exe1⤵
- Executes dropped EXE
PID:2832
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD58fb1199711c3b6afd7aa7b8595929e7f
SHA1ff8f1814fff095fa7cfd6c2bb07a1595b83c89c0
SHA256f30ab3c5c9a72ef605d9e171dc9d22e39d1f1114c36d87c24a16b8ccb4a5f749
SHA512dbd8765a9fcebee920335e41da43fc1b025460e3c1293a803be4f440a3cd6c0823f1f3bcd618a49ac8c7d07c29876ec8e2023e11c491f32faf16401a60821926
-
Filesize
248KB
MD58fb1199711c3b6afd7aa7b8595929e7f
SHA1ff8f1814fff095fa7cfd6c2bb07a1595b83c89c0
SHA256f30ab3c5c9a72ef605d9e171dc9d22e39d1f1114c36d87c24a16b8ccb4a5f749
SHA512dbd8765a9fcebee920335e41da43fc1b025460e3c1293a803be4f440a3cd6c0823f1f3bcd618a49ac8c7d07c29876ec8e2023e11c491f32faf16401a60821926
-
Filesize
211KB
MD502f3b25318b1cc3c6a24ad7a1738eede
SHA143182925664314e2fea57cc3daf719568385e6e0
SHA256987fed2dae35dedc1c52230b9938c2a351164d84e8874c8314957812ad641bdb
SHA512356f503151db78a98a2d309b1636693d71e814b3bd4c9ba3b4e6d8955ab6afede0e39c2517e9da03cd2047bdab046a4fdb5b49548f36a160030953e97f20e94c
-
Filesize
211KB
MD502f3b25318b1cc3c6a24ad7a1738eede
SHA143182925664314e2fea57cc3daf719568385e6e0
SHA256987fed2dae35dedc1c52230b9938c2a351164d84e8874c8314957812ad641bdb
SHA512356f503151db78a98a2d309b1636693d71e814b3bd4c9ba3b4e6d8955ab6afede0e39c2517e9da03cd2047bdab046a4fdb5b49548f36a160030953e97f20e94c