Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-04-2023 01:36
Static task
static1
Behavioral task
behavioral1
Sample
affb629af9de8ff0c78c3feaf7b81108.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
affb629af9de8ff0c78c3feaf7b81108.exe
Resource
win10v2004-20230220-en
General
-
Target
affb629af9de8ff0c78c3feaf7b81108.exe
-
Size
270KB
-
MD5
affb629af9de8ff0c78c3feaf7b81108
-
SHA1
a84cabf3aa2b6542e57a101f94f8ea0ea548a91b
-
SHA256
aca2368fa225fda4ea1d223ac914bf42ee81884dbe97536b832fb3706ca6ac1f
-
SHA512
f690f355b7e1e50ab82502009b98d054d5938fc9ff06918cf868ae3f10308a89b101b987655f9ed83dace43dd790d93d4792ac3a0fbac61614822c07d6f9b0a8
-
SSDEEP
3072:8cgSq3amsUo24elcTlq1Scfubj8X6MlC5MX6Gw+TDqYI:XqK5J2ONf8XVlC5MT
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
affb629af9de8ff0c78c3feaf7b81108.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI affb629af9de8ff0c78c3feaf7b81108.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI affb629af9de8ff0c78c3feaf7b81108.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI affb629af9de8ff0c78c3feaf7b81108.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
affb629af9de8ff0c78c3feaf7b81108.exepid process 1060 affb629af9de8ff0c78c3feaf7b81108.exe 1060 affb629af9de8ff0c78c3feaf7b81108.exe 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1264 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
affb629af9de8ff0c78c3feaf7b81108.exepid process 1060 affb629af9de8ff0c78c3feaf7b81108.exe