Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29-03-2023 01:49
Static task
static1
Behavioral task
behavioral1
Sample
250b96f746d338ed309919b5afc0c885354fadde2c84e8f7a8d7b2cb6529a0c8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
250b96f746d338ed309919b5afc0c885354fadde2c84e8f7a8d7b2cb6529a0c8.exe
Resource
win10v2004-20230220-en
General
-
Target
250b96f746d338ed309919b5afc0c885354fadde2c84e8f7a8d7b2cb6529a0c8.exe
-
Size
260KB
-
MD5
df685c46122667099f011d1e0e9e8c1b
-
SHA1
a8b4de4b407295525646d815b6aac6b82b7ffa2e
-
SHA256
250b96f746d338ed309919b5afc0c885354fadde2c84e8f7a8d7b2cb6529a0c8
-
SHA512
d57e2255d145a018313326d74dc49ee9902a62e69da487bd1e910f7ab068a9c5f89705426ed2b1f56891cc6e3575f22d12829721bcd89198166dfcfb9d7a9ddf
-
SSDEEP
6144:d0ruZmEkiLz7ZM9MN0LrOOO8kVPR2xluUA:CdEki/7ZWMN0OOO8wPRKA
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
250b96f746d338ed309919b5afc0c885354fadde2c84e8f7a8d7b2cb6529a0c8.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 250b96f746d338ed309919b5afc0c885354fadde2c84e8f7a8d7b2cb6529a0c8.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 250b96f746d338ed309919b5afc0c885354fadde2c84e8f7a8d7b2cb6529a0c8.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 250b96f746d338ed309919b5afc0c885354fadde2c84e8f7a8d7b2cb6529a0c8.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
250b96f746d338ed309919b5afc0c885354fadde2c84e8f7a8d7b2cb6529a0c8.exepid process 1676 250b96f746d338ed309919b5afc0c885354fadde2c84e8f7a8d7b2cb6529a0c8.exe 1676 250b96f746d338ed309919b5afc0c885354fadde2c84e8f7a8d7b2cb6529a0c8.exe 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1208 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
250b96f746d338ed309919b5afc0c885354fadde2c84e8f7a8d7b2cb6529a0c8.exepid process 1676 250b96f746d338ed309919b5afc0c885354fadde2c84e8f7a8d7b2cb6529a0c8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\250b96f746d338ed309919b5afc0c885354fadde2c84e8f7a8d7b2cb6529a0c8.exe"C:\Users\Admin\AppData\Local\Temp\250b96f746d338ed309919b5afc0c885354fadde2c84e8f7a8d7b2cb6529a0c8.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1676