Analysis
-
max time kernel
147s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2023, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220901-en
General
-
Target
file.exe
-
Size
193KB
-
MD5
1fdcefc88cc35b4ff7199ccc87bf870e
-
SHA1
ae709515d1f927583c15c9d19e8f7f75a292c070
-
SHA256
32cb8276e6a47e5ab898033755df317af903c775ad2ee52b393a306f9e01b77c
-
SHA512
4d308f3a9ea776365f77720a5f67f0e6f29488678a7a912564582eeeb7f8dec5e2ae40b4951e547aa36fdba079b2871207fba407033102f5e23d5693a3b1c207
-
SSDEEP
3072:WabWMwTZfLsbzmHkOW5U05VbgBE1tSSBEpc7r5hiOv2eL72skMa:WaYfLqzmEOcg21tSr0hiOXX2skM
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral2/memory/4816-133-0x0000000000510000-0x0000000000519000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 4900 42B6.exe 2520 9EC1.exe 3460 ntlhost.exe -
Loads dropped DLL 1 IoCs
pid Process 2836 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 9EC1.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1104 4900 WerFault.exe 87 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 73 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4816 file.exe 4816 file.exe 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found 1076 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1076 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4816 file.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 1076 Process not Found Token: SeCreatePagefilePrivilege 1076 Process not Found Token: SeShutdownPrivilege 1076 Process not Found Token: SeCreatePagefilePrivilege 1076 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1076 wrote to memory of 4900 1076 Process not Found 87 PID 1076 wrote to memory of 4900 1076 Process not Found 87 PID 1076 wrote to memory of 4900 1076 Process not Found 87 PID 4900 wrote to memory of 2836 4900 42B6.exe 88 PID 4900 wrote to memory of 2836 4900 42B6.exe 88 PID 4900 wrote to memory of 2836 4900 42B6.exe 88 PID 1076 wrote to memory of 2520 1076 Process not Found 92 PID 1076 wrote to memory of 2520 1076 Process not Found 92 PID 1076 wrote to memory of 2520 1076 Process not Found 92 PID 2520 wrote to memory of 3460 2520 9EC1.exe 93 PID 2520 wrote to memory of 3460 2520 9EC1.exe 93 PID 2520 wrote to memory of 3460 2520 9EC1.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4816
-
C:\Users\Admin\AppData\Local\Temp\42B6.exeC:\Users\Admin\AppData\Local\Temp\42B6.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Aupsoyqaypedu.dll,start2⤵
- Loads dropped DLL
PID:2836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 4802⤵
- Program crash
PID:1104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4900 -ip 49001⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\9EC1.exeC:\Users\Admin\AppData\Local\Temp\9EC1.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:3460
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5ebf1ca07a6fb0d55f50fc1ffd4d7c44e
SHA140d9b4e7d5fe64823d12556b1e178e7a4aa5c69d
SHA256f8c856af36925a137704cdc13b74b11dcd6d28607df657cfa0cbdde67e96ec5a
SHA51297f06757d580f13ff72fa8504cd89c8253d11200ba28a249de7afc3b82ff5377afff3b729b2debb72d4454d012b62bbbc192e09b07b2da68d7e5cb7588004237
-
Filesize
3.6MB
MD5ebf1ca07a6fb0d55f50fc1ffd4d7c44e
SHA140d9b4e7d5fe64823d12556b1e178e7a4aa5c69d
SHA256f8c856af36925a137704cdc13b74b11dcd6d28607df657cfa0cbdde67e96ec5a
SHA51297f06757d580f13ff72fa8504cd89c8253d11200ba28a249de7afc3b82ff5377afff3b729b2debb72d4454d012b62bbbc192e09b07b2da68d7e5cb7588004237
-
Filesize
1.8MB
MD515d34e6db935d28da7e5273798d97104
SHA1e60a3f0a4cf6b67f42f2f6e79c354d40298797c0
SHA256ea8b4c4134a4cc51fb0f71afa356d1976c8043c14e8c332e1bc9705336f3a93f
SHA512906199b568f657a8bf67a3c8d062225613e8cdd42eebc9888e40e73ce49bf66988414be3cbdffa11991f148fe973c1dcab17306ce1875fce5a2b642e995e4112
-
Filesize
1.8MB
MD515d34e6db935d28da7e5273798d97104
SHA1e60a3f0a4cf6b67f42f2f6e79c354d40298797c0
SHA256ea8b4c4134a4cc51fb0f71afa356d1976c8043c14e8c332e1bc9705336f3a93f
SHA512906199b568f657a8bf67a3c8d062225613e8cdd42eebc9888e40e73ce49bf66988414be3cbdffa11991f148fe973c1dcab17306ce1875fce5a2b642e995e4112
-
Filesize
4.3MB
MD51075fc212a63b18bc03fe7bf0f7a9951
SHA12770f3efcf6815737906f1ef127cd9a99eaf41fd
SHA256d01428119c56ba63677a077d6022ac053940bcf194c4b145018ea33f75425abe
SHA5123a389c321ec8207ceb385015bdb3617f3e6448cc5521ca6ca475014963dcf292ca0e9fd36e2a4c67e225942ba4a91ce12d1daab4d8ab09fb99b7639914239f65
-
Filesize
4.3MB
MD51075fc212a63b18bc03fe7bf0f7a9951
SHA12770f3efcf6815737906f1ef127cd9a99eaf41fd
SHA256d01428119c56ba63677a077d6022ac053940bcf194c4b145018ea33f75425abe
SHA5123a389c321ec8207ceb385015bdb3617f3e6448cc5521ca6ca475014963dcf292ca0e9fd36e2a4c67e225942ba4a91ce12d1daab4d8ab09fb99b7639914239f65
-
Filesize
541.5MB
MD55c11f50a8f1b25bbf3fbe3876e92fe8c
SHA15caaa5153716da918cd2d38455004189f009bde3
SHA256ccbafdb7823dd45254b115806a0e8d0b0a60b2af6a590be5a6040596841098cd
SHA512f803ffd2b8fe76ce8fd451f3a640da6fb0bacd65d10985ace838bae7b3033e9a44db0a559a9cf13c9e763b671285890d86fb72674c59019e71e27aebaea075dd
-
Filesize
544.4MB
MD548b5f832d62f9b3fd1e3af83efc917c1
SHA1ab90c4ca2313f794069adcf13e0078375dfd6cb4
SHA25654f048799dfd4a734535b1b8fa7f9a25434b9b1ae3245b83d3a7ce39b563e7b3
SHA512ab376ba455a26750aacb63e5172624aec6bccfa284d4270e0bd41a1a1a3b4093c8501a51211e1c961a3525819061ac232b5835ae312841d84789fc7f5f38cda1