Analysis
-
max time kernel
151s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/01/2023, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
186KB
-
MD5
029c166a222849e8b3f469a898a007e2
-
SHA1
3eddb679c6156becfd53260cfb9b9de22803c588
-
SHA256
035f6d6a187b809b4e8a5f6a051ed61feb015c52c912a9578933358ea2c5b9ab
-
SHA512
739c9ff27e94300818221c9472ded44caa5a0286b5a7237cce9dae2159679e0954b8327528d43412cd979cc2099453cca04e7b33f195e780708388c0d32e0b4f
-
SSDEEP
3072:3IeKY1XwLHC2Y5+5+eW3wrAT5YmxVj4Ipgm7mmNf2BUqF:b1XwLvY5ZeWys1RpJCecU
Malware Config
Signatures
-
Detects Smokeloader packer 6 IoCs
resource yara_rule behavioral2/memory/4976-133-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/2372-135-0x0000000002BB0000-0x0000000002BB9000-memory.dmp family_smokeloader behavioral2/memory/4976-136-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/4976-137-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/5088-144-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/5088-145-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 4664 hbjahdt 5088 hbjahdt -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2372 set thread context of 4976 2372 file.exe 80 PID 4664 set thread context of 5088 4664 hbjahdt 89 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hbjahdt Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hbjahdt Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hbjahdt -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4976 file.exe 4976 file.exe 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3048 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4976 file.exe 5088 hbjahdt -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3048 Process not Found Token: SeCreatePagefilePrivilege 3048 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2372 wrote to memory of 4976 2372 file.exe 80 PID 2372 wrote to memory of 4976 2372 file.exe 80 PID 2372 wrote to memory of 4976 2372 file.exe 80 PID 2372 wrote to memory of 4976 2372 file.exe 80 PID 2372 wrote to memory of 4976 2372 file.exe 80 PID 2372 wrote to memory of 4976 2372 file.exe 80 PID 4664 wrote to memory of 5088 4664 hbjahdt 89 PID 4664 wrote to memory of 5088 4664 hbjahdt 89 PID 4664 wrote to memory of 5088 4664 hbjahdt 89 PID 4664 wrote to memory of 5088 4664 hbjahdt 89 PID 4664 wrote to memory of 5088 4664 hbjahdt 89 PID 4664 wrote to memory of 5088 4664 hbjahdt 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4976
-
-
C:\Users\Admin\AppData\Roaming\hbjahdtC:\Users\Admin\AppData\Roaming\hbjahdt1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Roaming\hbjahdtC:\Users\Admin\AppData\Roaming\hbjahdt2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5088
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186KB
MD5029c166a222849e8b3f469a898a007e2
SHA13eddb679c6156becfd53260cfb9b9de22803c588
SHA256035f6d6a187b809b4e8a5f6a051ed61feb015c52c912a9578933358ea2c5b9ab
SHA512739c9ff27e94300818221c9472ded44caa5a0286b5a7237cce9dae2159679e0954b8327528d43412cd979cc2099453cca04e7b33f195e780708388c0d32e0b4f
-
Filesize
186KB
MD5029c166a222849e8b3f469a898a007e2
SHA13eddb679c6156becfd53260cfb9b9de22803c588
SHA256035f6d6a187b809b4e8a5f6a051ed61feb015c52c912a9578933358ea2c5b9ab
SHA512739c9ff27e94300818221c9472ded44caa5a0286b5a7237cce9dae2159679e0954b8327528d43412cd979cc2099453cca04e7b33f195e780708388c0d32e0b4f
-
Filesize
186KB
MD5029c166a222849e8b3f469a898a007e2
SHA13eddb679c6156becfd53260cfb9b9de22803c588
SHA256035f6d6a187b809b4e8a5f6a051ed61feb015c52c912a9578933358ea2c5b9ab
SHA512739c9ff27e94300818221c9472ded44caa5a0286b5a7237cce9dae2159679e0954b8327528d43412cd979cc2099453cca04e7b33f195e780708388c0d32e0b4f