Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-01-2023 23:57

General

  • Target

    fa0c5f16c7c78823b721cca2e63b6c2723379d0748cd0465a7718f8d4d88a940.exe

  • Size

    299KB

  • MD5

    3b8cb18a3aa1dd5e3eff31da2fd1aebf

  • SHA1

    e31f217df449ca9216130f6d8c7749f864b864fa

  • SHA256

    fa0c5f16c7c78823b721cca2e63b6c2723379d0748cd0465a7718f8d4d88a940

  • SHA512

    f4d28c56c09b446f0b40a8db51da92a6a5ccfa28ecbfa01283da6ad4237802cfdb43965273ef6a1545a3367a153151ef33d63096b6d116345522413e044df9e1

  • SSDEEP

    3072:Tznvz4LPqXRskmG/or72vePGedSLq5lao4WdMIQZKmqPUx6WfQz86YpRi3MM5A:Xz4LP9v2mPGa5/r2IHmqMoIdpg8M5

Malware Config

Signatures

  • Detects Smokeloader packer 6 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa0c5f16c7c78823b721cca2e63b6c2723379d0748cd0465a7718f8d4d88a940.exe
    "C:\Users\Admin\AppData\Local\Temp\fa0c5f16c7c78823b721cca2e63b6c2723379d0748cd0465a7718f8d4d88a940.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4356
    • C:\Users\Admin\AppData\Local\Temp\fa0c5f16c7c78823b721cca2e63b6c2723379d0748cd0465a7718f8d4d88a940.exe
      "C:\Users\Admin\AppData\Local\Temp\fa0c5f16c7c78823b721cca2e63b6c2723379d0748cd0465a7718f8d4d88a940.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:2184
  • C:\Users\Admin\AppData\Roaming\acffbtt
    C:\Users\Admin\AppData\Roaming\acffbtt
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3564
    • C:\Users\Admin\AppData\Roaming\acffbtt
      C:\Users\Admin\AppData\Roaming\acffbtt
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:240

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\acffbtt

    Filesize

    299KB

    MD5

    3b8cb18a3aa1dd5e3eff31da2fd1aebf

    SHA1

    e31f217df449ca9216130f6d8c7749f864b864fa

    SHA256

    fa0c5f16c7c78823b721cca2e63b6c2723379d0748cd0465a7718f8d4d88a940

    SHA512

    f4d28c56c09b446f0b40a8db51da92a6a5ccfa28ecbfa01283da6ad4237802cfdb43965273ef6a1545a3367a153151ef33d63096b6d116345522413e044df9e1

  • C:\Users\Admin\AppData\Roaming\acffbtt

    Filesize

    299KB

    MD5

    3b8cb18a3aa1dd5e3eff31da2fd1aebf

    SHA1

    e31f217df449ca9216130f6d8c7749f864b864fa

    SHA256

    fa0c5f16c7c78823b721cca2e63b6c2723379d0748cd0465a7718f8d4d88a940

    SHA512

    f4d28c56c09b446f0b40a8db51da92a6a5ccfa28ecbfa01283da6ad4237802cfdb43965273ef6a1545a3367a153151ef33d63096b6d116345522413e044df9e1

  • C:\Users\Admin\AppData\Roaming\acffbtt

    Filesize

    299KB

    MD5

    3b8cb18a3aa1dd5e3eff31da2fd1aebf

    SHA1

    e31f217df449ca9216130f6d8c7749f864b864fa

    SHA256

    fa0c5f16c7c78823b721cca2e63b6c2723379d0748cd0465a7718f8d4d88a940

    SHA512

    f4d28c56c09b446f0b40a8db51da92a6a5ccfa28ecbfa01283da6ad4237802cfdb43965273ef6a1545a3367a153151ef33d63096b6d116345522413e044df9e1

  • memory/240-140-0x0000000000000000-mapping.dmp

  • memory/240-144-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/240-145-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2184-136-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2184-137-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2184-133-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2184-132-0x0000000000000000-mapping.dmp

  • memory/3564-143-0x00000000004ED000-0x0000000000503000-memory.dmp

    Filesize

    88KB

  • memory/4356-135-0x00000000004E0000-0x00000000004E9000-memory.dmp

    Filesize

    36KB

  • memory/4356-134-0x000000000062D000-0x0000000000643000-memory.dmp

    Filesize

    88KB