Analysis
-
max time kernel
150s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31-03-2023 01:20
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230221-en
General
-
Target
setup.exe
-
Size
225KB
-
MD5
7578cd0136bfb2a34b43f28432da1d10
-
SHA1
0b7fa035f83fc37b613f7d3dbf5e79e2215d98b2
-
SHA256
1f68fd3e0444f8318bfc740181f500921b12a92426891a09c9af0d18b19745a0
-
SHA512
90c3742d31dea2870fef4530c36e7cfdba588dfb50d002f04b2d57e08539c9876c707e24a41080d3a11b87e06d5064c940b5ac63540bd2a1a80b4d22a38ad944
-
SSDEEP
3072:Apu1nD+NDSquW1QFCTObKupdpQhaBrs0AyysMj2BfvYQusRm/2Zjzt3hmsA:A6kDSPiQFts2dK8HYQpA2Zj
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
setup.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
setup.exepid process 2000 setup.exe 2000 setup.exe 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1184 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
setup.exepid process 2000 setup.exe