Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
15/02/2023, 03:29
Static task
static1
Behavioral task
behavioral1
Sample
9fe2f22ddcc6dc5dee230c6df02c24bada60c299994b6b19286ec55e1290675b.exe
Resource
win10v2004-20221111-en
General
-
Target
9fe2f22ddcc6dc5dee230c6df02c24bada60c299994b6b19286ec55e1290675b.exe
-
Size
193KB
-
MD5
955226b512ca0f7eed2e9cbcbb426b5f
-
SHA1
dedb3a694680d09945ed510a37999fae02c2ad0b
-
SHA256
9fe2f22ddcc6dc5dee230c6df02c24bada60c299994b6b19286ec55e1290675b
-
SHA512
f733d7885af68c6dcfdd987f6da913647f1db27701a13853bb3e533e3d1f451c1e9548f6655aac6d3870216a3d798aa6d21b5f9136fd703acb0bf3e22e546e5a
-
SSDEEP
3072:rhNoc+LSCON5aeuY2n15TZvY1EZbsIQ/K9rpqmbCIfm9EHVW4k:qLvOaHYg1VVgE8/K9omAEHVRk
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/4912-133-0x0000000000810000-0x0000000000819000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 4708 1CB0.exe 2272 sjuhcbj -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9fe2f22ddcc6dc5dee230c6df02c24bada60c299994b6b19286ec55e1290675b.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9fe2f22ddcc6dc5dee230c6df02c24bada60c299994b6b19286ec55e1290675b.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9fe2f22ddcc6dc5dee230c6df02c24bada60c299994b6b19286ec55e1290675b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sjuhcbj Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sjuhcbj Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sjuhcbj -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4912 9fe2f22ddcc6dc5dee230c6df02c24bada60c299994b6b19286ec55e1290675b.exe 4912 9fe2f22ddcc6dc5dee230c6df02c24bada60c299994b6b19286ec55e1290675b.exe 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3020 Process not Found -
Suspicious behavior: MapViewOfSection 20 IoCs
pid Process 4912 9fe2f22ddcc6dc5dee230c6df02c24bada60c299994b6b19286ec55e1290675b.exe 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 2272 sjuhcbj -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 3020 wrote to memory of 4708 3020 Process not Found 90 PID 3020 wrote to memory of 4708 3020 Process not Found 90 PID 3020 wrote to memory of 4064 3020 Process not Found 91 PID 3020 wrote to memory of 4064 3020 Process not Found 91 PID 3020 wrote to memory of 4064 3020 Process not Found 91 PID 3020 wrote to memory of 4064 3020 Process not Found 91 PID 3020 wrote to memory of 4200 3020 Process not Found 92 PID 3020 wrote to memory of 4200 3020 Process not Found 92 PID 3020 wrote to memory of 4200 3020 Process not Found 92 PID 3020 wrote to memory of 3900 3020 Process not Found 93 PID 3020 wrote to memory of 3900 3020 Process not Found 93 PID 3020 wrote to memory of 3900 3020 Process not Found 93 PID 3020 wrote to memory of 3900 3020 Process not Found 93 PID 3020 wrote to memory of 3724 3020 Process not Found 94 PID 3020 wrote to memory of 3724 3020 Process not Found 94 PID 3020 wrote to memory of 3724 3020 Process not Found 94 PID 3020 wrote to memory of 4544 3020 Process not Found 95 PID 3020 wrote to memory of 4544 3020 Process not Found 95 PID 3020 wrote to memory of 4544 3020 Process not Found 95 PID 3020 wrote to memory of 4544 3020 Process not Found 95 PID 3020 wrote to memory of 3496 3020 Process not Found 96 PID 3020 wrote to memory of 3496 3020 Process not Found 96 PID 3020 wrote to memory of 3496 3020 Process not Found 96 PID 3020 wrote to memory of 3496 3020 Process not Found 96 PID 3020 wrote to memory of 4376 3020 Process not Found 97 PID 3020 wrote to memory of 4376 3020 Process not Found 97 PID 3020 wrote to memory of 4376 3020 Process not Found 97 PID 3020 wrote to memory of 4376 3020 Process not Found 97 PID 3020 wrote to memory of 3392 3020 Process not Found 98 PID 3020 wrote to memory of 3392 3020 Process not Found 98 PID 3020 wrote to memory of 3392 3020 Process not Found 98 PID 3020 wrote to memory of 4560 3020 Process not Found 99 PID 3020 wrote to memory of 4560 3020 Process not Found 99 PID 3020 wrote to memory of 4560 3020 Process not Found 99 PID 3020 wrote to memory of 4560 3020 Process not Found 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fe2f22ddcc6dc5dee230c6df02c24bada60c299994b6b19286ec55e1290675b.exe"C:\Users\Admin\AppData\Local\Temp\9fe2f22ddcc6dc5dee230c6df02c24bada60c299994b6b19286ec55e1290675b.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4912
-
C:\Users\Admin\AppData\Local\Temp\1CB0.exeC:\Users\Admin\AppData\Local\Temp\1CB0.exe1⤵
- Executes dropped EXE
PID:4708
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4064
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4200
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3900
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3724
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4544
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3496
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4376
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3392
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4560
-
C:\Users\Admin\AppData\Roaming\sjuhcbjC:\Users\Admin\AppData\Roaming\sjuhcbj1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2272
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD59748489855d9dd82ab09da5e3e55b19e
SHA16ed2bf6a1a53a59cd2137812cb43b5032817f6a1
SHA25605bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b
SHA5127eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be
-
Filesize
4KB
MD59748489855d9dd82ab09da5e3e55b19e
SHA16ed2bf6a1a53a59cd2137812cb43b5032817f6a1
SHA25605bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b
SHA5127eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be
-
Filesize
193KB
MD5955226b512ca0f7eed2e9cbcbb426b5f
SHA1dedb3a694680d09945ed510a37999fae02c2ad0b
SHA2569fe2f22ddcc6dc5dee230c6df02c24bada60c299994b6b19286ec55e1290675b
SHA512f733d7885af68c6dcfdd987f6da913647f1db27701a13853bb3e533e3d1f451c1e9548f6655aac6d3870216a3d798aa6d21b5f9136fd703acb0bf3e22e546e5a
-
Filesize
193KB
MD5955226b512ca0f7eed2e9cbcbb426b5f
SHA1dedb3a694680d09945ed510a37999fae02c2ad0b
SHA2569fe2f22ddcc6dc5dee230c6df02c24bada60c299994b6b19286ec55e1290675b
SHA512f733d7885af68c6dcfdd987f6da913647f1db27701a13853bb3e533e3d1f451c1e9548f6655aac6d3870216a3d798aa6d21b5f9136fd703acb0bf3e22e546e5a