Analysis
-
max time kernel
150s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
30-03-2023 07:31
Static task
static1
Behavioral task
behavioral1
Sample
54d523a588b0a7e79dd59dfe6086ee99.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
54d523a588b0a7e79dd59dfe6086ee99.exe
Resource
win10v2004-20230220-en
General
-
Target
54d523a588b0a7e79dd59dfe6086ee99.exe
-
Size
249KB
-
MD5
54d523a588b0a7e79dd59dfe6086ee99
-
SHA1
2c29d86cb2a891f1a35f5cb79a8672e24e6bf631
-
SHA256
7e311d90455c95a32b9d46d4ac1656ff056acf966885c1da99027cc6bdda08d2
-
SHA512
8fb5cd19010c047b92ceda2c9c5750a5d3d0cc55bc8c6031ea53614ea80dd2143a77c2795d1a7bb6459579166889ccdbb969144f98dd10fa260bdb85dffc4c6c
-
SSDEEP
3072:I4EYtmo68Xssjkh9cAcCLN304NjgaZNeIWaHWejiAubrmA0I6FbJOJLyuRkOBJJb:SYMossjkh9cAPLKmxZNeItkEb2NLJR
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
54d523a588b0a7e79dd59dfe6086ee99.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 54d523a588b0a7e79dd59dfe6086ee99.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 54d523a588b0a7e79dd59dfe6086ee99.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 54d523a588b0a7e79dd59dfe6086ee99.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
54d523a588b0a7e79dd59dfe6086ee99.exepid process 1232 54d523a588b0a7e79dd59dfe6086ee99.exe 1232 54d523a588b0a7e79dd59dfe6086ee99.exe 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1208 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
54d523a588b0a7e79dd59dfe6086ee99.exepid process 1232 54d523a588b0a7e79dd59dfe6086ee99.exe