Analysis
-
max time kernel
150s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
04/03/2023, 07:53
Static task
static1
Behavioral task
behavioral1
Sample
23ab7d03d01006cc9eebea2de38925dd.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
23ab7d03d01006cc9eebea2de38925dd.exe
Resource
win10v2004-20230220-en
General
-
Target
23ab7d03d01006cc9eebea2de38925dd.exe
-
Size
207KB
-
MD5
23ab7d03d01006cc9eebea2de38925dd
-
SHA1
52c36dfe969bbec89362fd9488992584e8098576
-
SHA256
4b7e12886fb5db1b87075e3e995d60522a7f902cbca00a6f298194d7a3c443c6
-
SHA512
32076ddbdf73a4fd0dd0fe14aaf4990156f4fb99753d3c4b096c0faea340fee0c2c40ddbb5a37dd8684051bc9cbe4021dc57ce412898a9f4ec742cc44a80f3d6
-
SSDEEP
3072:T4C+7+kYUqS0eblv3CL1gmdyXel1nXJBF8WCY+dMGb3jAXPSQ:cf7UUZ0eb9I1j0el5X3FDCRjj
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/1720-55-0x0000000000220000-0x0000000000229000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 23ab7d03d01006cc9eebea2de38925dd.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 23ab7d03d01006cc9eebea2de38925dd.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 23ab7d03d01006cc9eebea2de38925dd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1720 23ab7d03d01006cc9eebea2de38925dd.exe 1720 23ab7d03d01006cc9eebea2de38925dd.exe 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1212 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1720 23ab7d03d01006cc9eebea2de38925dd.exe