Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-03-2023 14:21
Static task
static1
Behavioral task
behavioral1
Sample
52a81c3cc0703a5f1053cb18a583244a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
52a81c3cc0703a5f1053cb18a583244a.exe
Resource
win10v2004-20230220-en
General
-
Target
52a81c3cc0703a5f1053cb18a583244a.exe
-
Size
300KB
-
MD5
52a81c3cc0703a5f1053cb18a583244a
-
SHA1
4e868d2e9a2e8852a4ac74fba5f8e6404350dd7e
-
SHA256
7b8400245c4ae4c8a7728369b2ec2832556fef83a1d70917bf6019ca8cbd8ed5
-
SHA512
89618a3dc93a8bf278569dc8acb1a454bff08e63fe258d8fe4ea788bf39bad1458faad713f944819ce58d8797ecd8df4c5c173eb084ad26c30c505a286b9fd30
-
SSDEEP
3072:F+02jE1LBoBPNsybiL6PGWYvg6TSe5EQ1XQS4qSDpTqnI3Qk1YB:FL2jE1LmBlsybiKYFSeuGQdu
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 52a81c3cc0703a5f1053cb18a583244a.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 52a81c3cc0703a5f1053cb18a583244a.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 52a81c3cc0703a5f1053cb18a583244a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1132 52a81c3cc0703a5f1053cb18a583244a.exe 1132 52a81c3cc0703a5f1053cb18a583244a.exe 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1212 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1132 52a81c3cc0703a5f1053cb18a583244a.exe