Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
31/01/2023, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
8b4e8c2d8b4e9876d6e4dcea91200191b45e9240dc630dca1501263c206811d5.exe
Resource
win10-20220901-en
General
-
Target
8b4e8c2d8b4e9876d6e4dcea91200191b45e9240dc630dca1501263c206811d5.exe
-
Size
297KB
-
MD5
c6f4d7972d271013dd2588644330d0bf
-
SHA1
e8d1cd3b32942f269d931ab54549cdacc20169af
-
SHA256
8b4e8c2d8b4e9876d6e4dcea91200191b45e9240dc630dca1501263c206811d5
-
SHA512
856d91cc688c6e85b3fa4a508bd87ee5827b816d3accebc5e0bc280aa6ce02a402d92239e1cda9b8c36d4019dfb4db4de6f4debae8843da496bf9e3a80969641
-
SSDEEP
3072:E5ubJmLBdRAfCJ0O65BoibDMuNn6Os0vk6gVx/atmqPUx6WfQz86vE3MMo:dbJmLB0fIdkBgDytmqMoIWE8M
Malware Config
Signatures
-
Detects Smokeloader packer 8 IoCs
resource yara_rule behavioral1/memory/328-147-0x0000000002180000-0x0000000002189000-memory.dmp family_smokeloader behavioral1/memory/3080-151-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3080-152-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/3080-162-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3080-183-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4860-215-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/4860-247-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4860-248-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 3980 bvjrhwg 4860 bvjrhwg -
Deletes itself 1 IoCs
pid Process 2952 Process not Found -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 328 set thread context of 3080 328 8b4e8c2d8b4e9876d6e4dcea91200191b45e9240dc630dca1501263c206811d5.exe 66 PID 3980 set thread context of 4860 3980 bvjrhwg 68 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8b4e8c2d8b4e9876d6e4dcea91200191b45e9240dc630dca1501263c206811d5.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8b4e8c2d8b4e9876d6e4dcea91200191b45e9240dc630dca1501263c206811d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bvjrhwg Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bvjrhwg Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bvjrhwg Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8b4e8c2d8b4e9876d6e4dcea91200191b45e9240dc630dca1501263c206811d5.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3080 8b4e8c2d8b4e9876d6e4dcea91200191b45e9240dc630dca1501263c206811d5.exe 3080 8b4e8c2d8b4e9876d6e4dcea91200191b45e9240dc630dca1501263c206811d5.exe 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2952 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3080 8b4e8c2d8b4e9876d6e4dcea91200191b45e9240dc630dca1501263c206811d5.exe 4860 bvjrhwg -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2952 Process not Found Token: SeCreatePagefilePrivilege 2952 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 328 wrote to memory of 3080 328 8b4e8c2d8b4e9876d6e4dcea91200191b45e9240dc630dca1501263c206811d5.exe 66 PID 328 wrote to memory of 3080 328 8b4e8c2d8b4e9876d6e4dcea91200191b45e9240dc630dca1501263c206811d5.exe 66 PID 328 wrote to memory of 3080 328 8b4e8c2d8b4e9876d6e4dcea91200191b45e9240dc630dca1501263c206811d5.exe 66 PID 328 wrote to memory of 3080 328 8b4e8c2d8b4e9876d6e4dcea91200191b45e9240dc630dca1501263c206811d5.exe 66 PID 328 wrote to memory of 3080 328 8b4e8c2d8b4e9876d6e4dcea91200191b45e9240dc630dca1501263c206811d5.exe 66 PID 328 wrote to memory of 3080 328 8b4e8c2d8b4e9876d6e4dcea91200191b45e9240dc630dca1501263c206811d5.exe 66 PID 3980 wrote to memory of 4860 3980 bvjrhwg 68 PID 3980 wrote to memory of 4860 3980 bvjrhwg 68 PID 3980 wrote to memory of 4860 3980 bvjrhwg 68 PID 3980 wrote to memory of 4860 3980 bvjrhwg 68 PID 3980 wrote to memory of 4860 3980 bvjrhwg 68 PID 3980 wrote to memory of 4860 3980 bvjrhwg 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b4e8c2d8b4e9876d6e4dcea91200191b45e9240dc630dca1501263c206811d5.exe"C:\Users\Admin\AppData\Local\Temp\8b4e8c2d8b4e9876d6e4dcea91200191b45e9240dc630dca1501263c206811d5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Users\Admin\AppData\Local\Temp\8b4e8c2d8b4e9876d6e4dcea91200191b45e9240dc630dca1501263c206811d5.exe"C:\Users\Admin\AppData\Local\Temp\8b4e8c2d8b4e9876d6e4dcea91200191b45e9240dc630dca1501263c206811d5.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3080
-
-
C:\Users\Admin\AppData\Roaming\bvjrhwgC:\Users\Admin\AppData\Roaming\bvjrhwg1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Roaming\bvjrhwgC:\Users\Admin\AppData\Roaming\bvjrhwg2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4860
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297KB
MD5c6f4d7972d271013dd2588644330d0bf
SHA1e8d1cd3b32942f269d931ab54549cdacc20169af
SHA2568b4e8c2d8b4e9876d6e4dcea91200191b45e9240dc630dca1501263c206811d5
SHA512856d91cc688c6e85b3fa4a508bd87ee5827b816d3accebc5e0bc280aa6ce02a402d92239e1cda9b8c36d4019dfb4db4de6f4debae8843da496bf9e3a80969641
-
Filesize
297KB
MD5c6f4d7972d271013dd2588644330d0bf
SHA1e8d1cd3b32942f269d931ab54549cdacc20169af
SHA2568b4e8c2d8b4e9876d6e4dcea91200191b45e9240dc630dca1501263c206811d5
SHA512856d91cc688c6e85b3fa4a508bd87ee5827b816d3accebc5e0bc280aa6ce02a402d92239e1cda9b8c36d4019dfb4db4de6f4debae8843da496bf9e3a80969641
-
Filesize
297KB
MD5c6f4d7972d271013dd2588644330d0bf
SHA1e8d1cd3b32942f269d931ab54549cdacc20169af
SHA2568b4e8c2d8b4e9876d6e4dcea91200191b45e9240dc630dca1501263c206811d5
SHA512856d91cc688c6e85b3fa4a508bd87ee5827b816d3accebc5e0bc280aa6ce02a402d92239e1cda9b8c36d4019dfb4db4de6f4debae8843da496bf9e3a80969641