Analysis
-
max time kernel
120s -
max time network
138s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 22:06
Static task
static1
Behavioral task
behavioral1
Sample
1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe
Resource
win10-en-20211208
General
-
Target
1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe
-
Size
454KB
-
MD5
6df420b5d8bddb0f5ffe3edcc9a4464b
-
SHA1
80452695af5841bb75d4cfe1f754e49cf329007c
-
SHA256
1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b
-
SHA512
edb53a617602bf3c6e668ccac4a04856cc15079d65fbcb21ad8c7391d87d72164a21a06a3ed682f9f299597ac46413f89927a3fbab25627b031b90afd8866f2d
Malware Config
Extracted
smokeloader
2019
http://topdalescotty.top/xsmkld/index.php
http://billyjimmyer.top/xsmkld/index.php
http://angelmariotti.xyz/xsmkld/index.php
http://tommyhalfigero.top/xsmkld/index.php
http://dannysannyer.top/xsmkld/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Loads dropped DLL 1 IoCs
Processes:
1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exepid process 2756 1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe -
Checks SCSI registry key(s) 3 TTPs 7 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags 1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags 1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exepid process 2756 1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe 2756 1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe"C:\Users\Admin\AppData\Local\Temp\1ee1ba514212f11a69d002005dfc623b1871cc808f18ddfa2191102bbb9f623b.exe"1⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2756
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
50741b3f2d7debf5d2bed63d88404029
SHA156210388a627b926162b36967045be06ffb1aad3
SHA256f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c
SHA512fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3