Analysis
-
max time kernel
150s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-03-2023 09:23
Static task
static1
Behavioral task
behavioral1
Sample
741c8c1b81e1517b4486a15391719627.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
741c8c1b81e1517b4486a15391719627.exe
Resource
win10v2004-20230220-en
General
-
Target
741c8c1b81e1517b4486a15391719627.exe
-
Size
173KB
-
MD5
741c8c1b81e1517b4486a15391719627
-
SHA1
aecb2eb2a4078817afd24fda32032acea90bbaba
-
SHA256
c47dc2eaf404c8eba401e9ba87ec9afa6dc03f309b2475828b18a76bf212aca3
-
SHA512
ea2c6aca1ee0aff11471c06914cb9719c8ecc7c4860c0444c1a19a20ab5e113fddec87582c83052eeb5d5e10dd7d58109f2e8cf722ba4f9afda94176aabb01e7
-
SSDEEP
3072:Tor8++GZZ/YWitdHyX56k9Q1RiKhGKvjm/hVRdJB:a8JuX560QniKhW/hdJ
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 741c8c1b81e1517b4486a15391719627.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 741c8c1b81e1517b4486a15391719627.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 741c8c1b81e1517b4486a15391719627.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1992 741c8c1b81e1517b4486a15391719627.exe 1992 741c8c1b81e1517b4486a15391719627.exe 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1188 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1992 741c8c1b81e1517b4486a15391719627.exe