Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16/02/2023, 00:09
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
205KB
-
MD5
05bc99ce9688cc06dea5e76c432aa9eb
-
SHA1
5624f3ce3de8c6532a1128cd93933c6e6cd3e367
-
SHA256
56efcacfde1c2964e3d83156e99dbc29bfbcf8a2382c614472b08fa01a62c76f
-
SHA512
3e5fd7e61aeb1c41645dfcfb9c76177702c0cdd693b288dab3252b15c975e0625c218147c7efc721d2a70b347c0d02e999232e25f1ac66e5c1e0eb2fd3410c7a
-
SSDEEP
3072:jUodx9cVqP3sH2d9ZC9QMzV+X7mpuei1vTmrh9Ax672sPaaaahT2M:j9dAUc2fcyMzccmdm7AxO
Malware Config
Signatures
-
Detects Smokeloader packer 6 IoCs
resource yara_rule behavioral2/memory/5004-133-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/4728-135-0x00000000008C0000-0x00000000008C9000-memory.dmp family_smokeloader behavioral2/memory/5004-136-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/5004-137-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/824-144-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/824-145-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 2348 fascweb 824 fascweb -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4728 set thread context of 5004 4728 file.exe 82 PID 2348 set thread context of 824 2348 fascweb 91 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fascweb Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fascweb Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fascweb -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5004 file.exe 5004 file.exe 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found 740 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 740 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 5004 file.exe 824 fascweb -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 740 Process not Found Token: SeCreatePagefilePrivilege 740 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4728 wrote to memory of 5004 4728 file.exe 82 PID 4728 wrote to memory of 5004 4728 file.exe 82 PID 4728 wrote to memory of 5004 4728 file.exe 82 PID 4728 wrote to memory of 5004 4728 file.exe 82 PID 4728 wrote to memory of 5004 4728 file.exe 82 PID 4728 wrote to memory of 5004 4728 file.exe 82 PID 2348 wrote to memory of 824 2348 fascweb 91 PID 2348 wrote to memory of 824 2348 fascweb 91 PID 2348 wrote to memory of 824 2348 fascweb 91 PID 2348 wrote to memory of 824 2348 fascweb 91 PID 2348 wrote to memory of 824 2348 fascweb 91 PID 2348 wrote to memory of 824 2348 fascweb 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5004
-
-
C:\Users\Admin\AppData\Roaming\fascwebC:\Users\Admin\AppData\Roaming\fascweb1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Roaming\fascwebC:\Users\Admin\AppData\Roaming\fascweb2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:824
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD505bc99ce9688cc06dea5e76c432aa9eb
SHA15624f3ce3de8c6532a1128cd93933c6e6cd3e367
SHA25656efcacfde1c2964e3d83156e99dbc29bfbcf8a2382c614472b08fa01a62c76f
SHA5123e5fd7e61aeb1c41645dfcfb9c76177702c0cdd693b288dab3252b15c975e0625c218147c7efc721d2a70b347c0d02e999232e25f1ac66e5c1e0eb2fd3410c7a
-
Filesize
205KB
MD505bc99ce9688cc06dea5e76c432aa9eb
SHA15624f3ce3de8c6532a1128cd93933c6e6cd3e367
SHA25656efcacfde1c2964e3d83156e99dbc29bfbcf8a2382c614472b08fa01a62c76f
SHA5123e5fd7e61aeb1c41645dfcfb9c76177702c0cdd693b288dab3252b15c975e0625c218147c7efc721d2a70b347c0d02e999232e25f1ac66e5c1e0eb2fd3410c7a
-
Filesize
205KB
MD505bc99ce9688cc06dea5e76c432aa9eb
SHA15624f3ce3de8c6532a1128cd93933c6e6cd3e367
SHA25656efcacfde1c2964e3d83156e99dbc29bfbcf8a2382c614472b08fa01a62c76f
SHA5123e5fd7e61aeb1c41645dfcfb9c76177702c0cdd693b288dab3252b15c975e0625c218147c7efc721d2a70b347c0d02e999232e25f1ac66e5c1e0eb2fd3410c7a