Analysis
-
max time kernel
150s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
26/03/2023, 01:07
Static task
static1
Behavioral task
behavioral1
Sample
d650c339b5d54ae7d87c0a173b07bd86e6490b3c0ea4d2521d2b4e2dbfdd4c83.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d650c339b5d54ae7d87c0a173b07bd86e6490b3c0ea4d2521d2b4e2dbfdd4c83.exe
Resource
win10v2004-20230220-en
General
-
Target
d650c339b5d54ae7d87c0a173b07bd86e6490b3c0ea4d2521d2b4e2dbfdd4c83.exe
-
Size
276KB
-
MD5
1797d9504e975e78660f67f3f6a3d89b
-
SHA1
2e15e7918c730d139dfe98e98edeeb12f5e1e209
-
SHA256
d650c339b5d54ae7d87c0a173b07bd86e6490b3c0ea4d2521d2b4e2dbfdd4c83
-
SHA512
77da7edae42f070c21439837f34e8fadb27e594decaa246eba9265fd0efcbb0e5b503b9a6e5a4cdbedb43bee3a7142c1c24caf008e9db95410dd00ced69ea591
-
SSDEEP
3072:qoy7Va2BP1+qaWCwe0/IVmrykZ41CxHEs/IVvgjUVc98JtEv2FWN8aeDr:jCgSq2IVm01OEsmIje5/mEva
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d650c339b5d54ae7d87c0a173b07bd86e6490b3c0ea4d2521d2b4e2dbfdd4c83.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d650c339b5d54ae7d87c0a173b07bd86e6490b3c0ea4d2521d2b4e2dbfdd4c83.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d650c339b5d54ae7d87c0a173b07bd86e6490b3c0ea4d2521d2b4e2dbfdd4c83.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 316 d650c339b5d54ae7d87c0a173b07bd86e6490b3c0ea4d2521d2b4e2dbfdd4c83.exe 316 d650c339b5d54ae7d87c0a173b07bd86e6490b3c0ea4d2521d2b4e2dbfdd4c83.exe 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1220 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 316 d650c339b5d54ae7d87c0a173b07bd86e6490b3c0ea4d2521d2b4e2dbfdd4c83.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d650c339b5d54ae7d87c0a173b07bd86e6490b3c0ea4d2521d2b4e2dbfdd4c83.exe"C:\Users\Admin\AppData\Local\Temp\d650c339b5d54ae7d87c0a173b07bd86e6490b3c0ea4d2521d2b4e2dbfdd4c83.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:316