Analysis
-
max time kernel
150s -
max time network
59s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
16/02/2023, 03:34
Static task
static1
Behavioral task
behavioral1
Sample
344a4c4462ceaf3c4fe5834bc833d4039e287a1f23abe77eb12a991ee4210948.exe
Resource
win10-20220901-en
General
-
Target
344a4c4462ceaf3c4fe5834bc833d4039e287a1f23abe77eb12a991ee4210948.exe
-
Size
204KB
-
MD5
37259045d151e550432de1709310c2f5
-
SHA1
1bf0dd3779825e9a3978e6a7abd186ba86858529
-
SHA256
344a4c4462ceaf3c4fe5834bc833d4039e287a1f23abe77eb12a991ee4210948
-
SHA512
0e3c98580564c197e533eb5deda52eecbfa00260c5ab2a4297218fa1ff6fae9c64714c0ab187ed69cd9788242d42a6767b3e8754512e14d6c78c7313de0bf45f
-
SSDEEP
3072:rYkUfrqMFYMoVONClgp9yQFr/jswFJu71hb1OchSeo0Alp3B9Ejp/reLzQ:EHfrqQNmw0QOwjYf1OchSeo0Alyjpi
Malware Config
Signatures
-
Detects Smokeloader packer 4 IoCs
resource yara_rule behavioral1/memory/3304-159-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/3304-158-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3304-169-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3304-190-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 2056 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2656 set thread context of 3304 2656 344a4c4462ceaf3c4fe5834bc833d4039e287a1f23abe77eb12a991ee4210948.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 344a4c4462ceaf3c4fe5834bc833d4039e287a1f23abe77eb12a991ee4210948.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 344a4c4462ceaf3c4fe5834bc833d4039e287a1f23abe77eb12a991ee4210948.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 344a4c4462ceaf3c4fe5834bc833d4039e287a1f23abe77eb12a991ee4210948.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3304 344a4c4462ceaf3c4fe5834bc833d4039e287a1f23abe77eb12a991ee4210948.exe 3304 344a4c4462ceaf3c4fe5834bc833d4039e287a1f23abe77eb12a991ee4210948.exe 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found 2056 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2056 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3304 344a4c4462ceaf3c4fe5834bc833d4039e287a1f23abe77eb12a991ee4210948.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2656 wrote to memory of 3304 2656 344a4c4462ceaf3c4fe5834bc833d4039e287a1f23abe77eb12a991ee4210948.exe 66 PID 2656 wrote to memory of 3304 2656 344a4c4462ceaf3c4fe5834bc833d4039e287a1f23abe77eb12a991ee4210948.exe 66 PID 2656 wrote to memory of 3304 2656 344a4c4462ceaf3c4fe5834bc833d4039e287a1f23abe77eb12a991ee4210948.exe 66 PID 2656 wrote to memory of 3304 2656 344a4c4462ceaf3c4fe5834bc833d4039e287a1f23abe77eb12a991ee4210948.exe 66 PID 2656 wrote to memory of 3304 2656 344a4c4462ceaf3c4fe5834bc833d4039e287a1f23abe77eb12a991ee4210948.exe 66 PID 2656 wrote to memory of 3304 2656 344a4c4462ceaf3c4fe5834bc833d4039e287a1f23abe77eb12a991ee4210948.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\344a4c4462ceaf3c4fe5834bc833d4039e287a1f23abe77eb12a991ee4210948.exe"C:\Users\Admin\AppData\Local\Temp\344a4c4462ceaf3c4fe5834bc833d4039e287a1f23abe77eb12a991ee4210948.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\344a4c4462ceaf3c4fe5834bc833d4039e287a1f23abe77eb12a991ee4210948.exe"C:\Users\Admin\AppData\Local\Temp\344a4c4462ceaf3c4fe5834bc833d4039e287a1f23abe77eb12a991ee4210948.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3304
-