Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
11-04-2023 12:21
Static task
static1
Behavioral task
behavioral1
Sample
c452ca86033a0e3b08a790ce12e66d74.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c452ca86033a0e3b08a790ce12e66d74.exe
Resource
win10v2004-20230220-en
General
-
Target
c452ca86033a0e3b08a790ce12e66d74.exe
-
Size
193KB
-
MD5
c452ca86033a0e3b08a790ce12e66d74
-
SHA1
a237fcb0d4825fe3d2496507627aea7035472547
-
SHA256
d0a86383e80d1c157e784f3162c9f9e1f73e18fbc65ac84785112126eceac46b
-
SHA512
0d992b53a4356cbc0a5dac5cdb282647d513b89daaa9a928fd80ba3242a4d5df7fef1f86f7ee06a8ef2e0a89a0d7a0160df42a512de0aff9fb091b9554246b01
-
SSDEEP
3072:iZa19U41FW32FEzT9vzQxEr9MFGg29Q485pqFIq:8OjzW3e0T9bQOr9MD4D
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c452ca86033a0e3b08a790ce12e66d74.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c452ca86033a0e3b08a790ce12e66d74.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c452ca86033a0e3b08a790ce12e66d74.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1380 c452ca86033a0e3b08a790ce12e66d74.exe 1380 c452ca86033a0e3b08a790ce12e66d74.exe 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1264 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1380 c452ca86033a0e3b08a790ce12e66d74.exe