Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-03-2023 01:25
Static task
static1
Behavioral task
behavioral1
Sample
c45365acb54ee1edf3eda04ca895367520f3dcc86772c8561ba6eca0479fe331.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c45365acb54ee1edf3eda04ca895367520f3dcc86772c8561ba6eca0479fe331.exe
Resource
win10v2004-20230220-en
General
-
Target
c45365acb54ee1edf3eda04ca895367520f3dcc86772c8561ba6eca0479fe331.exe
-
Size
192KB
-
MD5
776d703ba06d6334fad959d7c305b8c2
-
SHA1
c1bacae38027067a911c382af96c7d5ebc210fb8
-
SHA256
c45365acb54ee1edf3eda04ca895367520f3dcc86772c8561ba6eca0479fe331
-
SHA512
11e4bce2b251a9b3d1504ed23aa69a832697bb923db5290eab78c6e4ca38180e65a32500f61756325e156156ed85d00e257c7aaaed72cf3ffd9b1c851a24801f
-
SSDEEP
3072:V4c4SvQ/YIF1avmmFxFhxmtrU5CxKfJDOZwI6TTA3Uwfyz:Vr4J/YIzC42CNPOOa
Malware Config
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/1264-55-0x00000000001B0000-0x00000000001B9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c45365acb54ee1edf3eda04ca895367520f3dcc86772c8561ba6eca0479fe331.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c45365acb54ee1edf3eda04ca895367520f3dcc86772c8561ba6eca0479fe331.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c45365acb54ee1edf3eda04ca895367520f3dcc86772c8561ba6eca0479fe331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1264 c45365acb54ee1edf3eda04ca895367520f3dcc86772c8561ba6eca0479fe331.exe 1264 c45365acb54ee1edf3eda04ca895367520f3dcc86772c8561ba6eca0479fe331.exe 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1180 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1264 c45365acb54ee1edf3eda04ca895367520f3dcc86772c8561ba6eca0479fe331.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c45365acb54ee1edf3eda04ca895367520f3dcc86772c8561ba6eca0479fe331.exe"C:\Users\Admin\AppData\Local\Temp\c45365acb54ee1edf3eda04ca895367520f3dcc86772c8561ba6eca0479fe331.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1264