Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13/03/2023, 10:43
Static task
static1
Behavioral task
behavioral1
Sample
dd45680504395a404c346c97089f3077d376f7adae2517a62fe0020c73806981.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
dd45680504395a404c346c97089f3077d376f7adae2517a62fe0020c73806981.exe
Resource
win10v2004-20230221-en
General
-
Target
dd45680504395a404c346c97089f3077d376f7adae2517a62fe0020c73806981.exe
-
Size
270KB
-
MD5
4be996d41c1828980f8f1dc218249896
-
SHA1
b65dd3368d20e04d6bb02031be1f784ca37278e0
-
SHA256
dd45680504395a404c346c97089f3077d376f7adae2517a62fe0020c73806981
-
SHA512
0946ee35a96367f5743ff9452b86d7995d38de4a33e11cdabc08601cf280a1c7faffa950bae5cacfe9246506d19ab34c1c2666e3c9a1b358ab72a8cfd55026a9
-
SSDEEP
3072:fkb7qg2MqRWoliM6YU9ZNCM7Ll2SMCp3ZvJsmOQ5j1dpX6n+TDqYI:6qVMqRmMTUxjp/b39Jsmpxdp
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dd45680504395a404c346c97089f3077d376f7adae2517a62fe0020c73806981.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dd45680504395a404c346c97089f3077d376f7adae2517a62fe0020c73806981.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dd45680504395a404c346c97089f3077d376f7adae2517a62fe0020c73806981.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1060 dd45680504395a404c346c97089f3077d376f7adae2517a62fe0020c73806981.exe 1060 dd45680504395a404c346c97089f3077d376f7adae2517a62fe0020c73806981.exe 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1264 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1060 dd45680504395a404c346c97089f3077d376f7adae2517a62fe0020c73806981.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd45680504395a404c346c97089f3077d376f7adae2517a62fe0020c73806981.exe"C:\Users\Admin\AppData\Local\Temp\dd45680504395a404c346c97089f3077d376f7adae2517a62fe0020c73806981.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1060