Analysis
-
max time kernel
151s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
04-03-2023 17:25
Static task
static1
Behavioral task
behavioral1
Sample
78e426a4a1152fcd664359dc397c34d8ad637725dafe18ef262a9f700e0bdf7a.exe
Resource
win10v2004-20230221-en
General
-
Target
78e426a4a1152fcd664359dc397c34d8ad637725dafe18ef262a9f700e0bdf7a.exe
-
Size
181KB
-
MD5
ea1c1109d75b12a3bda3e308c3dd8960
-
SHA1
417b5f689cdb85829e4bdd1b5ef97de9aa96c2e0
-
SHA256
78e426a4a1152fcd664359dc397c34d8ad637725dafe18ef262a9f700e0bdf7a
-
SHA512
ff345a5250b1d753d9802a8932bf5f497add0cfd017b530f942ab488b22a9b38c0c9027d9ec61a2fa026a44a28db732bb6643658f17d8ed8da6361f983002d19
-
SSDEEP
3072:Pn3xqHXBBgXfGYVDkBkM+OovzlsRIPXgeNja/JI0Kx:J2XngXf9aBGjzlsRIPweNUC0K
Malware Config
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/1260-134-0x00000000006D0000-0x00000000006D9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4380 E37F.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2136 4380 WerFault.exe 94 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 78e426a4a1152fcd664359dc397c34d8ad637725dafe18ef262a9f700e0bdf7a.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 78e426a4a1152fcd664359dc397c34d8ad637725dafe18ef262a9f700e0bdf7a.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 78e426a4a1152fcd664359dc397c34d8ad637725dafe18ef262a9f700e0bdf7a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1260 78e426a4a1152fcd664359dc397c34d8ad637725dafe18ef262a9f700e0bdf7a.exe 1260 78e426a4a1152fcd664359dc397c34d8ad637725dafe18ef262a9f700e0bdf7a.exe 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 732 Process not Found -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 1260 78e426a4a1152fcd664359dc397c34d8ad637725dafe18ef262a9f700e0bdf7a.exe 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found 732 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 732 Process not Found Token: SeCreatePagefilePrivilege 732 Process not Found -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 732 wrote to memory of 4380 732 Process not Found 94 PID 732 wrote to memory of 4380 732 Process not Found 94 PID 732 wrote to memory of 4380 732 Process not Found 94 PID 732 wrote to memory of 4564 732 Process not Found 95 PID 732 wrote to memory of 4564 732 Process not Found 95 PID 732 wrote to memory of 4564 732 Process not Found 95 PID 732 wrote to memory of 4564 732 Process not Found 95 PID 732 wrote to memory of 4728 732 Process not Found 96 PID 732 wrote to memory of 4728 732 Process not Found 96 PID 732 wrote to memory of 4728 732 Process not Found 96 PID 732 wrote to memory of 1892 732 Process not Found 97 PID 732 wrote to memory of 1892 732 Process not Found 97 PID 732 wrote to memory of 1892 732 Process not Found 97 PID 732 wrote to memory of 1892 732 Process not Found 97 PID 732 wrote to memory of 3960 732 Process not Found 98 PID 732 wrote to memory of 3960 732 Process not Found 98 PID 732 wrote to memory of 3960 732 Process not Found 98 PID 732 wrote to memory of 548 732 Process not Found 99 PID 732 wrote to memory of 548 732 Process not Found 99 PID 732 wrote to memory of 548 732 Process not Found 99 PID 732 wrote to memory of 548 732 Process not Found 99 PID 732 wrote to memory of 5048 732 Process not Found 103 PID 732 wrote to memory of 5048 732 Process not Found 103 PID 732 wrote to memory of 5048 732 Process not Found 103 PID 732 wrote to memory of 5048 732 Process not Found 103 PID 732 wrote to memory of 2908 732 Process not Found 104 PID 732 wrote to memory of 2908 732 Process not Found 104 PID 732 wrote to memory of 2908 732 Process not Found 104 PID 732 wrote to memory of 2908 732 Process not Found 104 PID 732 wrote to memory of 3664 732 Process not Found 105 PID 732 wrote to memory of 3664 732 Process not Found 105 PID 732 wrote to memory of 3664 732 Process not Found 105 PID 732 wrote to memory of 1280 732 Process not Found 108 PID 732 wrote to memory of 1280 732 Process not Found 108 PID 732 wrote to memory of 1280 732 Process not Found 108 PID 732 wrote to memory of 1280 732 Process not Found 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\78e426a4a1152fcd664359dc397c34d8ad637725dafe18ef262a9f700e0bdf7a.exe"C:\Users\Admin\AppData\Local\Temp\78e426a4a1152fcd664359dc397c34d8ad637725dafe18ef262a9f700e0bdf7a.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1260
-
C:\Users\Admin\AppData\Local\Temp\E37F.exeC:\Users\Admin\AppData\Local\Temp\E37F.exe1⤵
- Executes dropped EXE
PID:4380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 2882⤵
- Program crash
PID:2136
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4564
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4728
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1892
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3960
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4380 -ip 43801⤵PID:3412
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5048
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2908
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3664
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1280
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD560b55a03146e3388672a9578fa5626a9
SHA1f59712dde5092fe6d2fccbf421b387abf9dfcfb5
SHA256bf021a868b03fa52ae398181b986f44784c734daafb0aaca8aee6d810bf08b9b
SHA51287ea61e46abbd0f0c30b98084a4b500b777a2cb3462f667c04d46ecbc67e743b339cbc8ad369c0f02f43e4035a814266a7121e39c40a01aaf451c3dd85c30d34
-
Filesize
180KB
MD560b55a03146e3388672a9578fa5626a9
SHA1f59712dde5092fe6d2fccbf421b387abf9dfcfb5
SHA256bf021a868b03fa52ae398181b986f44784c734daafb0aaca8aee6d810bf08b9b
SHA51287ea61e46abbd0f0c30b98084a4b500b777a2cb3462f667c04d46ecbc67e743b339cbc8ad369c0f02f43e4035a814266a7121e39c40a01aaf451c3dd85c30d34