Analysis
-
max time kernel
150s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-03-2023 21:31
Static task
static1
Behavioral task
behavioral1
Sample
98b75c052e1c6cb0ba7fa1d96428d511.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
98b75c052e1c6cb0ba7fa1d96428d511.exe
Resource
win10v2004-20230220-en
General
-
Target
98b75c052e1c6cb0ba7fa1d96428d511.exe
-
Size
295KB
-
MD5
98b75c052e1c6cb0ba7fa1d96428d511
-
SHA1
cc12ae6171b2bd7c7f1d7c1e09d9c018a0ca4ce5
-
SHA256
e73684efd4a0a9582be97a9353e9044c0fb501af7a9c89e15fce2434595d4156
-
SHA512
f0a95b3ff3f6fc8c8e2bb44b81ed5d6a0d95463bcd8676d74fc51eb6930144338142521a805062647ab8c6b65731dc09c9343ce6570881db28afc93555f194c4
-
SSDEEP
3072:yU887wzLvxWtbhJxJDnp7UhDsqcEq4Lkn/QOpwydfteuMb:zNwzLvwtbF1p7Uuqi4LW4G+u
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 98b75c052e1c6cb0ba7fa1d96428d511.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 98b75c052e1c6cb0ba7fa1d96428d511.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 98b75c052e1c6cb0ba7fa1d96428d511.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1556 98b75c052e1c6cb0ba7fa1d96428d511.exe 1556 98b75c052e1c6cb0ba7fa1d96428d511.exe 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1248 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1556 98b75c052e1c6cb0ba7fa1d96428d511.exe