Analysis
-
max time kernel
154s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
09-02-2023 08:02
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
197KB
-
MD5
7ff972b22c38b488c9bd8faaee20f191
-
SHA1
70cc8dfd8fb9a70acf149627ca0a5af48bc869cb
-
SHA256
7fbdcce122af8b4fe1638f1ddf87c738a7499d89d52db78d3f86a812171b6454
-
SHA512
a61b8a175591de0aa9fb70a69f98cd01cd2524b706a3885750c5d3ea6e8bf4753b3ea13cce774a8f71ebf0db60ee40cc0528c5d9d64fa3df230624be53fcf8f7
-
SSDEEP
3072:nGsO7VZUS5qUw1LmblWuzd5TaXC7v6lTj8ViAXFj6rBQWL:nGschoL2lXSD5jwHj6n
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
ad75d4e2e9636ca662a337b6e798d36159f23acfc89bbe9400d0d451bd8d69fd
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral2/memory/3772-133-0x0000000000630000-0x0000000000639000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation F84A.exe -
Executes dropped EXE 2 IoCs
pid Process 4972 F84A.exe 3668 svcupdater.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4900 4972 WerFault.exe 84 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1936 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3772 file.exe 3772 file.exe 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found 2532 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2532 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3772 file.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 2532 Process not Found Token: SeCreatePagefilePrivilege 2532 Process not Found Token: SeShutdownPrivilege 2532 Process not Found Token: SeCreatePagefilePrivilege 2532 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2532 wrote to memory of 4972 2532 Process not Found 84 PID 2532 wrote to memory of 4972 2532 Process not Found 84 PID 2532 wrote to memory of 4972 2532 Process not Found 84 PID 4972 wrote to memory of 1936 4972 F84A.exe 85 PID 4972 wrote to memory of 1936 4972 F84A.exe 85 PID 4972 wrote to memory of 1936 4972 F84A.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3772
-
C:\Users\Admin\AppData\Local\Temp\F84A.exeC:\Users\Admin\AppData\Local\Temp\F84A.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "svcupdater" /tr "C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f2⤵
- Creates scheduled task(s)
PID:1936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 11522⤵
- Program crash
PID:4900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4972 -ip 49721⤵PID:1472
-
C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exeC:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe1⤵
- Executes dropped EXE
PID:3668
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
378KB
MD5b141bc58618c537917cc1da179cbe8ab
SHA1c76d3f5eeae9493e41a272a974b5dfec5f4e4724
SHA256fd999e4a07d8b3d95f9d9231fd496b0125b56094f1b03ddca7a7b074c1d8c03e
SHA5125c72f63124a394602a36a4f985e33a41e8159f54653f431c270b8f0fa8e13131517c31b497a936d5f5d3d27397f40fc7909efc4bfd04c01bcca7f306860c3114
-
Filesize
378KB
MD5b141bc58618c537917cc1da179cbe8ab
SHA1c76d3f5eeae9493e41a272a974b5dfec5f4e4724
SHA256fd999e4a07d8b3d95f9d9231fd496b0125b56094f1b03ddca7a7b074c1d8c03e
SHA5125c72f63124a394602a36a4f985e33a41e8159f54653f431c270b8f0fa8e13131517c31b497a936d5f5d3d27397f40fc7909efc4bfd04c01bcca7f306860c3114
-
Filesize
414.8MB
MD5a069f39ddd851cfb271d6e0421b4c7f2
SHA11382783b69813af03de900acb1dd1878d7e4259e
SHA256fbf82c2c060efd1ba96ae60b1b10589d653ab966c10617727805ac2f7db967b1
SHA512c738dc98f9eff8ba7b50c4fc329ebb09e98440d9652d1f30bf3886e8c6df75c330cce8054454aac0f73bcdd7741ebe017e9eb34e4eeac7ba293f0e2d83b94be1
-
Filesize
419.6MB
MD5c786ade3edb8b04a5f8a7f121433362e
SHA1554442906818b4a6920442531ce67dfb64b4339e
SHA256e0102c7f2a071d2dda722f9f3c5aea37d86654f94fc8e34d2e101aadabbb67d6
SHA512eb15b215b0e89391fd5d3682edcefa4d74f48a577c1a413c9357330adc63bcda7f8b13c1602424898e99a7d1b694084f0087ce04d218b72a4d9fc4574e258325