Analysis
-
max time kernel
150s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08/03/2023, 11:19
Static task
static1
Behavioral task
behavioral1
Sample
2487cb55ca95b48878951f446ad9bad2e36c7e0fe13861c56760dba446e1b3ea.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2487cb55ca95b48878951f446ad9bad2e36c7e0fe13861c56760dba446e1b3ea.exe
Resource
win10v2004-20230220-en
General
-
Target
2487cb55ca95b48878951f446ad9bad2e36c7e0fe13861c56760dba446e1b3ea.exe
-
Size
316KB
-
MD5
8d4f9140840fa96dc0d0c09ab4fe4723
-
SHA1
c7cb6ef0d52afe8527049093b1fc8d5e8de47215
-
SHA256
2487cb55ca95b48878951f446ad9bad2e36c7e0fe13861c56760dba446e1b3ea
-
SHA512
dc1c7ffc630cf97d76e3296a7a622ebfa49d9429b457239e6d86f389222fa46b1e715395a8b9cb1cd94fa4e37931c66d5353ded073ce9cca2e04ac0d92784370
-
SSDEEP
6144:z3J7LyWLKiz9O97JYgCXkeunZIT1c2oa:BmWWiRC7FC041/oa
Malware Config
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/1300-55-0x00000000001B0000-0x00000000001B9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2487cb55ca95b48878951f446ad9bad2e36c7e0fe13861c56760dba446e1b3ea.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2487cb55ca95b48878951f446ad9bad2e36c7e0fe13861c56760dba446e1b3ea.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2487cb55ca95b48878951f446ad9bad2e36c7e0fe13861c56760dba446e1b3ea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1300 2487cb55ca95b48878951f446ad9bad2e36c7e0fe13861c56760dba446e1b3ea.exe 1300 2487cb55ca95b48878951f446ad9bad2e36c7e0fe13861c56760dba446e1b3ea.exe 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1196 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1300 2487cb55ca95b48878951f446ad9bad2e36c7e0fe13861c56760dba446e1b3ea.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2487cb55ca95b48878951f446ad9bad2e36c7e0fe13861c56760dba446e1b3ea.exe"C:\Users\Admin\AppData\Local\Temp\2487cb55ca95b48878951f446ad9bad2e36c7e0fe13861c56760dba446e1b3ea.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1300