Analysis
-
max time kernel
106s -
max time network
78s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-04-2023 16:10
Static task
static1
Behavioral task
behavioral1
Sample
3568a98b73da0f7ea6d2b5593d39eb22ad01fded9c3ea9dffb04d8e1ea2b97dd.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3568a98b73da0f7ea6d2b5593d39eb22ad01fded9c3ea9dffb04d8e1ea2b97dd.exe
Resource
win10v2004-20230221-en
General
-
Target
3568a98b73da0f7ea6d2b5593d39eb22ad01fded9c3ea9dffb04d8e1ea2b97dd.exe
-
Size
244KB
-
MD5
98c02acb0401448098dc6c09911c7053
-
SHA1
5611794292c3214d0ffb0491c23377e866ccbd46
-
SHA256
3568a98b73da0f7ea6d2b5593d39eb22ad01fded9c3ea9dffb04d8e1ea2b97dd
-
SHA512
c93d7c2a2c060e72a13ff6c387a1f33ad7708971411b3517fb37e4c0c0dc9a11015a4bd991c4977f6c46c3f04ab6162ff7eaf2248fc76351c73d5ffa812a9fa2
-
SSDEEP
3072:ZP55LCODn2vojx8NZ8lx5UCwZMqs3gIIn29UH++mKqfCDicC6nCzHcn:cOTDjqYUnXs2nOUepCDicy
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
3568a98b73da0f7ea6d2b5593d39eb22ad01fded9c3ea9dffb04d8e1ea2b97dd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3568a98b73da0f7ea6d2b5593d39eb22ad01fded9c3ea9dffb04d8e1ea2b97dd.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3568a98b73da0f7ea6d2b5593d39eb22ad01fded9c3ea9dffb04d8e1ea2b97dd.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3568a98b73da0f7ea6d2b5593d39eb22ad01fded9c3ea9dffb04d8e1ea2b97dd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3568a98b73da0f7ea6d2b5593d39eb22ad01fded9c3ea9dffb04d8e1ea2b97dd.exepid process 1376 3568a98b73da0f7ea6d2b5593d39eb22ad01fded9c3ea9dffb04d8e1ea2b97dd.exe 1376 3568a98b73da0f7ea6d2b5593d39eb22ad01fded9c3ea9dffb04d8e1ea2b97dd.exe 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 1244 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1244 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
3568a98b73da0f7ea6d2b5593d39eb22ad01fded9c3ea9dffb04d8e1ea2b97dd.exepid process 1376 3568a98b73da0f7ea6d2b5593d39eb22ad01fded9c3ea9dffb04d8e1ea2b97dd.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1244 1244 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1244 1244
Processes
-
C:\Users\Admin\AppData\Local\Temp\3568a98b73da0f7ea6d2b5593d39eb22ad01fded9c3ea9dffb04d8e1ea2b97dd.exe"C:\Users\Admin\AppData\Local\Temp\3568a98b73da0f7ea6d2b5593d39eb22ad01fded9c3ea9dffb04d8e1ea2b97dd.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1376