Analysis
-
max time kernel
138s -
max time network
53s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
17-06-2020 16:16
Static task
static1
Behavioral task
behavioral1
Sample
37ea915af4b89c5697fd8647175dbc25.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
37ea915af4b89c5697fd8647175dbc25.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
37ea915af4b89c5697fd8647175dbc25.exe
-
Size
32KB
-
MD5
37ea915af4b89c5697fd8647175dbc25
-
SHA1
b0b41abda47839c37c007f4c9e03dfad55084f70
-
SHA256
383dede6a6d363e97a2d34a002aca69378da4b6769b13976b0344a20272a7d9d
-
SHA512
f0ad407facf9801a2e25ca0c1b495f7c93cb633f1c2416c6b412d11108bec67018eb08928181318be1cc259e48a7cc2c5995b7467e7b93a641f048299e824596
Score
10/10
Malware Config
Extracted
Family
smokeloader
Version
2018
C2
http://185.35.137.147/mlp/
rc4.i32
rc4.i32
Signatures
-
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
37ea915af4b89c5697fd8647175dbc25.exepid process 3656 37ea915af4b89c5697fd8647175dbc25.exe 3656 37ea915af4b89c5697fd8647175dbc25.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
37ea915af4b89c5697fd8647175dbc25.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 37ea915af4b89c5697fd8647175dbc25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 37ea915af4b89c5697fd8647175dbc25.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.