Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/02/2023, 04:24

General

  • Target

    d6dd09b2a07d1e0ffa6bb3eaf8173e7cd158a13db35189500c3dff37bfee0a71.exe

  • Size

    194KB

  • MD5

    ba266f8e0385c4b245b1f5313e81fb33

  • SHA1

    d6999dbcd0fa9c3b07f1fb6ddaefefa8465a61de

  • SHA256

    d6dd09b2a07d1e0ffa6bb3eaf8173e7cd158a13db35189500c3dff37bfee0a71

  • SHA512

    752d5646fdc8919b1fb7f2b58d7fca54c995931c52e608fc48df44edefaef9ec0c8874b17fc80045dc76aff35ac7a80ba0e7517b7e101cb5ad422f5ddc2fe5d3

  • SSDEEP

    3072:ozsOb7TKdksQDLvjmKOWja5qh8cG3FhL3cJ52ggoAVQfz:ozsI2uLvDODBLsJZgoAVQfz

Malware Config

Signatures

  • Detects Smokeloader packer 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of SetThreadContext 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6dd09b2a07d1e0ffa6bb3eaf8173e7cd158a13db35189500c3dff37bfee0a71.exe
    "C:\Users\Admin\AppData\Local\Temp\d6dd09b2a07d1e0ffa6bb3eaf8173e7cd158a13db35189500c3dff37bfee0a71.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4308
    • C:\Users\Admin\AppData\Local\Temp\d6dd09b2a07d1e0ffa6bb3eaf8173e7cd158a13db35189500c3dff37bfee0a71.exe
      "C:\Users\Admin\AppData\Local\Temp\d6dd09b2a07d1e0ffa6bb3eaf8173e7cd158a13db35189500c3dff37bfee0a71.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:2788

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2788-135-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/2788-137-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/2788-138-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/4308-132-0x00000000005EE000-0x0000000000601000-memory.dmp

          Filesize

          76KB

        • memory/4308-133-0x00000000006D0000-0x00000000006D9000-memory.dmp

          Filesize

          36KB

        • memory/4308-136-0x00000000005EE000-0x0000000000601000-memory.dmp

          Filesize

          76KB