Analysis
-
max time kernel
151s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
11/04/2023, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
066b02711e1f408bac89314fb7276995.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
066b02711e1f408bac89314fb7276995.exe
Resource
win10v2004-20230220-en
General
-
Target
066b02711e1f408bac89314fb7276995.exe
-
Size
197KB
-
MD5
066b02711e1f408bac89314fb7276995
-
SHA1
082c2bff03b9a8ab2d1b2c7ff99b2d0ad8474cba
-
SHA256
9bf7a5f2f86ef5ed1fec866ae9f9eb20148a0d27a0769eb9aaa9210393e4e38c
-
SHA512
5a5dd93cced144c4b31ae4a0a8a1aff98ad049450870edbd9f4b6648892f1dfa166ccfcbd2d6da488eaf9b72c057d99b5660bc07e2ba0255999a32193b82270f
-
SSDEEP
3072:/M28nc6SCINHc3G0EnrS8kT4c6U5GeI+GYG5totb4HW/bunrpXhOv2a6:028cr83/ErS8k4c60G5tST/s24
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 066b02711e1f408bac89314fb7276995.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 066b02711e1f408bac89314fb7276995.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 066b02711e1f408bac89314fb7276995.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1980 066b02711e1f408bac89314fb7276995.exe 1980 066b02711e1f408bac89314fb7276995.exe 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1344 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1980 066b02711e1f408bac89314fb7276995.exe