Analysis
-
max time kernel
150s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-03-2023 19:03
Static task
static1
Behavioral task
behavioral1
Sample
195abb468e546fbaa66ec219c4ceb298.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
195abb468e546fbaa66ec219c4ceb298.exe
Resource
win10v2004-20230220-en
General
-
Target
195abb468e546fbaa66ec219c4ceb298.exe
-
Size
296KB
-
MD5
195abb468e546fbaa66ec219c4ceb298
-
SHA1
3f465d9d286b9f687b2e80a751a7746b3de0a2ca
-
SHA256
f556ab5cb7ef703c3584b538c8056657fedea624cfcc262295bca3b0dd8c839a
-
SHA512
d3c6112f4601b54f399bfac714df9bfb52e01555522680856b7c618e673ab5b5bf5605a0170c794c4970a3689df7ed153f87649bdaa79220b7fd551be23ff94f
-
SSDEEP
3072:I0FeLgHLtyGI6veJP+CbIMT0B16RCmO87jm/Q3YiqI4y7itmpVuMR:d6gHLt7Iqg2C8MwB16smbTfug
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 195abb468e546fbaa66ec219c4ceb298.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 195abb468e546fbaa66ec219c4ceb298.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 195abb468e546fbaa66ec219c4ceb298.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1768 195abb468e546fbaa66ec219c4ceb298.exe 1768 195abb468e546fbaa66ec219c4ceb298.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1200 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1768 195abb468e546fbaa66ec219c4ceb298.exe