Analysis

  • max time kernel
    150s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06-02-2023 07:14

General

  • Target

    d0a4e0e3ed54a45113962e05be0fecc8143c3484fbcbb3c890d8ea41f7586e36.exe

  • Size

    105KB

  • MD5

    a6d97b5c9d9a4932b5c6c7457bc8c60e

  • SHA1

    7afa706e0ad9c9be82711b1b2c1e113534da70c5

  • SHA256

    d0a4e0e3ed54a45113962e05be0fecc8143c3484fbcbb3c890d8ea41f7586e36

  • SHA512

    aa14f821365c6fbe6e7cb1fbae28d59ae879e90d7e6143356b0d8db3fc129ca1486e7ba9973a394d444a51a47fe80e4bd15082506761d7401d4c4ac977800196

  • SSDEEP

    1536:FPRNkYJTrgdiPluOcN6IBVEqp+xJHWe2zm4uz5dh3Hkq4/T6dcE1sgxcirUt:FPR9ttcQIToHWef4u136E6gxcirUt

Malware Config

Signatures

  • Detects Smokeloader packer 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0a4e0e3ed54a45113962e05be0fecc8143c3484fbcbb3c890d8ea41f7586e36.exe
    "C:\Users\Admin\AppData\Local\Temp\d0a4e0e3ed54a45113962e05be0fecc8143c3484fbcbb3c890d8ea41f7586e36.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:924
    • C:\Users\Admin\AppData\Local\Temp\d0a4e0e3ed54a45113962e05be0fecc8143c3484fbcbb3c890d8ea41f7586e36.exe
      C:\Users\Admin\AppData\Local\Temp\d0a4e0e3ed54a45113962e05be0fecc8143c3484fbcbb3c890d8ea41f7586e36.exe
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:316

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/316-63-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/316-70-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/316-69-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/316-66-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/316-64-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/924-61-0x000000006EE40000-0x000000006F3EB000-memory.dmp

    Filesize

    5.7MB

  • memory/924-62-0x000000006EE40000-0x000000006F3EB000-memory.dmp

    Filesize

    5.7MB

  • memory/924-60-0x000000006EE40000-0x000000006F3EB000-memory.dmp

    Filesize

    5.7MB

  • memory/1216-54-0x00000000013C0000-0x00000000013E0000-memory.dmp

    Filesize

    128KB

  • memory/1216-57-0x00000000004E0000-0x00000000004EC000-memory.dmp

    Filesize

    48KB

  • memory/1216-56-0x0000000005A40000-0x0000000005AE6000-memory.dmp

    Filesize

    664KB

  • memory/1216-55-0x0000000074DE1000-0x0000000074DE3000-memory.dmp

    Filesize

    8KB