Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
28-01-2022 22:06
Static task
static1
Behavioral task
behavioral1
Sample
1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe
Resource
win10-en-20211208
General
-
Target
1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe
-
Size
454KB
-
MD5
6df420b5d8bddb0f5ffe3edcc9a4464b
-
SHA1
80452695af5841bb75d4cfe1f754e49cf329007c
-
SHA256
1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b
-
SHA512
edb53a617602bf3c6e668ccac4a04856cc15079d65fbcb21ad8c7391d87d72164a21a06a3ed682f9f299597ac46413f89927a3fbab25627b031b90afd8866f2d
Malware Config
Extracted
smokeloader
2019
http://topdalescotty.top/xsmkld/index.php
http://billyjimmyer.top/xsmkld/index.php
http://angelmariotti.xyz/xsmkld/index.php
http://tommyhalfigero.top/xsmkld/index.php
http://dannysannyer.top/xsmkld/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Loads dropped DLL 1 IoCs
Processes:
1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exepid process 308 1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exepid process 308 1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe 308 1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe"C:\Users\Admin\AppData\Local\Temp\1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe"1⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06