Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19/03/2023, 18:06
Static task
static1
Behavioral task
behavioral1
Sample
c04020e5e9111141155e941bb9c6e22e63cb79f0f707d3261ca35b1d57c2c215.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c04020e5e9111141155e941bb9c6e22e63cb79f0f707d3261ca35b1d57c2c215.exe
Resource
win10v2004-20230220-en
General
-
Target
c04020e5e9111141155e941bb9c6e22e63cb79f0f707d3261ca35b1d57c2c215.exe
-
Size
296KB
-
MD5
9c6e3d830653a68493c3755dec0f8425
-
SHA1
8caaf93f9f3279c65517f5133751ab37bbf77f58
-
SHA256
c04020e5e9111141155e941bb9c6e22e63cb79f0f707d3261ca35b1d57c2c215
-
SHA512
8d420296251f67874bc311b52dbad11e6312b9d7794a03fbc1c54472977e9c48be7ccfef916e31aaef2c541fd624154047435f910dbb43686ca6b32859c38c25
-
SSDEEP
3072:v00qLg1LgBGrSaG1pLqvnvUuSXLz1GUVvuG/YfQFaI4yhituCuM:cXg1LgwrSb1tUUuhUVGN4FDMu
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c04020e5e9111141155e941bb9c6e22e63cb79f0f707d3261ca35b1d57c2c215.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c04020e5e9111141155e941bb9c6e22e63cb79f0f707d3261ca35b1d57c2c215.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c04020e5e9111141155e941bb9c6e22e63cb79f0f707d3261ca35b1d57c2c215.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2024 c04020e5e9111141155e941bb9c6e22e63cb79f0f707d3261ca35b1d57c2c215.exe 2024 c04020e5e9111141155e941bb9c6e22e63cb79f0f707d3261ca35b1d57c2c215.exe 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1244 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2024 c04020e5e9111141155e941bb9c6e22e63cb79f0f707d3261ca35b1d57c2c215.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c04020e5e9111141155e941bb9c6e22e63cb79f0f707d3261ca35b1d57c2c215.exe"C:\Users\Admin\AppData\Local\Temp\c04020e5e9111141155e941bb9c6e22e63cb79f0f707d3261ca35b1d57c2c215.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2024