Analysis

  • max time kernel
    206s
  • max time network
    208s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-02-2023 14:30

General

  • Target

    file.exe

  • Size

    239KB

  • MD5

    022da43a8538b6e3738eae1068d09e43

  • SHA1

    31d658f7028486442cac2f7fa21a170769a5101d

  • SHA256

    92e9bfa6067e2aa0af4b125cf4d61f3f3a6366dd23dfb4b81a7c66f0b172d1d7

  • SHA512

    048e5c7433366c0aa1dafd9aba43a60fff2edfaac2e86b30c3b7d62c1a3687b73fd5d9171e277043d6124b49a34bc44c5c8a478483705fe3283695bc84d9ab5a

  • SSDEEP

    3072:3tbo5t/K1ohqeE8LS5B+xpN5vGZEzRcpm5zRxOEcP:9SYeFLKANBGZEfzRkEc

Malware Config

Signatures

  • Detects Smokeloader packer 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of SetThreadContext 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4156
    • C:\Users\Admin\AppData\Local\Temp\file.exe
      "C:\Users\Admin\AppData\Local\Temp\file.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:4956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4156-134-0x00000000009AD000-0x00000000009C3000-memory.dmp

    Filesize

    88KB

  • memory/4156-135-0x00000000008F0000-0x00000000008F9000-memory.dmp

    Filesize

    36KB

  • memory/4956-132-0x0000000000000000-mapping.dmp

  • memory/4956-133-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4956-136-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4956-137-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB