Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2023, 15:13

General

  • Target

    847df7499a12b558a430705d38bc102f.exe

  • Size

    179KB

  • MD5

    847df7499a12b558a430705d38bc102f

  • SHA1

    1cb8d00b5c6d59017fcc726752f92a897675e7e7

  • SHA256

    afb9be9201a75b4794d6565b9edcbbbc9419adae67797a52dcbbc1da899b3708

  • SHA512

    3a0efa56a7c866df6825de104f82c752a230bf75c6b45dbffe97501c800febf5b47eb86572afb99667cdcad031bd33ec2531adbb1c7cb23b90a8593a8d47951b

  • SSDEEP

    1536:qR51PFCTj72kma5XBm19H2dazhHhSVriS52h/+Rch4NxQpUJKJJYvIybq41t0OEo:qJPcL5XBI5YaNHOWSwl3yxKRJYdq41E

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\847df7499a12b558a430705d38bc102f.exe
    "C:\Users\Admin\AppData\Local\Temp\847df7499a12b558a430705d38bc102f.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3036
  • C:\Users\Admin\AppData\Local\Temp\EBBC.exe
    C:\Users\Admin\AppData\Local\Temp\EBBC.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3484
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Ruifriwreh.dll,start
      2⤵
      • Loads dropped DLL
      PID:4476

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\EBBC.exe

    Filesize

    3.6MB

    MD5

    ef5551169969f613798eb4ddb129b69a

    SHA1

    e9e7107ddcfa1a6fc489b5c5871701dc6fdd9cde

    SHA256

    dd0b0e73613718c349ef44e8b2ba6650bff678a3a2d4e857bfc3d9369cbf0e2a

    SHA512

    2644c47fe214f4c95fca2e0afaedaecc98b531452e13b0fead35d3aab286d1b6ae42c313070c23d5092c242d299004f900e26b4930a86dbfe88b688ea3e7e448

  • C:\Users\Admin\AppData\Local\Temp\EBBC.exe

    Filesize

    3.6MB

    MD5

    ef5551169969f613798eb4ddb129b69a

    SHA1

    e9e7107ddcfa1a6fc489b5c5871701dc6fdd9cde

    SHA256

    dd0b0e73613718c349ef44e8b2ba6650bff678a3a2d4e857bfc3d9369cbf0e2a

    SHA512

    2644c47fe214f4c95fca2e0afaedaecc98b531452e13b0fead35d3aab286d1b6ae42c313070c23d5092c242d299004f900e26b4930a86dbfe88b688ea3e7e448

  • C:\Users\Admin\AppData\Local\Temp\Ruifriwreh.dll

    Filesize

    4.3MB

    MD5

    80f365b5fe7791c5cf01c6081ec8cbcf

    SHA1

    0c3b246a76c55163b2061b08f62cc0cb06d75080

    SHA256

    3d0a9bcd9ad7e194d332ecad96363910977d7be7b7a2c3b1162b97aa72889934

    SHA512

    59d78c7e06788a4093fe02d24bc4ad3170acf5866f8b9d65545312e6c9ceca3dd2b853d74a3557a75bf7d1e689396f530fde30c37d08a90ad3d928c23e4198db

  • C:\Users\Admin\AppData\Local\Temp\Ruifriwreh.dll

    Filesize

    4.3MB

    MD5

    80f365b5fe7791c5cf01c6081ec8cbcf

    SHA1

    0c3b246a76c55163b2061b08f62cc0cb06d75080

    SHA256

    3d0a9bcd9ad7e194d332ecad96363910977d7be7b7a2c3b1162b97aa72889934

    SHA512

    59d78c7e06788a4093fe02d24bc4ad3170acf5866f8b9d65545312e6c9ceca3dd2b853d74a3557a75bf7d1e689396f530fde30c37d08a90ad3d928c23e4198db

  • C:\Users\Admin\AppData\Local\Temp\Ruifriwreh.dll

    Filesize

    4.3MB

    MD5

    80f365b5fe7791c5cf01c6081ec8cbcf

    SHA1

    0c3b246a76c55163b2061b08f62cc0cb06d75080

    SHA256

    3d0a9bcd9ad7e194d332ecad96363910977d7be7b7a2c3b1162b97aa72889934

    SHA512

    59d78c7e06788a4093fe02d24bc4ad3170acf5866f8b9d65545312e6c9ceca3dd2b853d74a3557a75bf7d1e689396f530fde30c37d08a90ad3d928c23e4198db

  • memory/3036-133-0x0000000000940000-0x0000000000949000-memory.dmp

    Filesize

    36KB

  • memory/3036-134-0x0000000000400000-0x0000000000788000-memory.dmp

    Filesize

    3.5MB

  • memory/3036-135-0x0000000000400000-0x0000000000788000-memory.dmp

    Filesize

    3.5MB

  • memory/3036-132-0x000000000085E000-0x0000000000873000-memory.dmp

    Filesize

    84KB

  • memory/3484-140-0x00000000029B0000-0x0000000002E9A000-memory.dmp

    Filesize

    4.9MB

  • memory/3484-142-0x0000000002621000-0x00000000029A9000-memory.dmp

    Filesize

    3.5MB

  • memory/3484-143-0x0000000000400000-0x00000000008F6000-memory.dmp

    Filesize

    5.0MB

  • memory/3484-141-0x0000000000400000-0x00000000008F6000-memory.dmp

    Filesize

    5.0MB

  • memory/3484-139-0x0000000002621000-0x00000000029A9000-memory.dmp

    Filesize

    3.5MB

  • memory/3484-149-0x0000000000400000-0x00000000008F6000-memory.dmp

    Filesize

    5.0MB

  • memory/4476-148-0x0000000001FB0000-0x0000000002405000-memory.dmp

    Filesize

    4.3MB