Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
12-04-2023 01:43
Static task
static1
Behavioral task
behavioral1
Sample
10f3989e8fa0f2b29e1aabdc9f2b6d8112217c3c34409837f3fe4ae5f2b0f9c4.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
10f3989e8fa0f2b29e1aabdc9f2b6d8112217c3c34409837f3fe4ae5f2b0f9c4.exe
Resource
win10v2004-20230220-en
General
-
Target
10f3989e8fa0f2b29e1aabdc9f2b6d8112217c3c34409837f3fe4ae5f2b0f9c4.exe
-
Size
196KB
-
MD5
29fec1cacff20e1697d9fc3347841d9c
-
SHA1
6d5304c9243553fa1f8c12a04528a8e924afefa9
-
SHA256
10f3989e8fa0f2b29e1aabdc9f2b6d8112217c3c34409837f3fe4ae5f2b0f9c4
-
SHA512
252849e48dd241d16432b85d442c1ea8925f9c2601361996b8e391a90780b71222cee262153f7dcd170feaaa68c3ae9d0a47e7f9c6ccd22b2a78bd434f3fe130
-
SSDEEP
3072:GW28cPNh3QNGTQOXDjsKWQB0K/js5DOFfgxPZaSkLrkGrGib:L28uMqQO8HARkOFfy7k0Ja
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 10f3989e8fa0f2b29e1aabdc9f2b6d8112217c3c34409837f3fe4ae5f2b0f9c4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 10f3989e8fa0f2b29e1aabdc9f2b6d8112217c3c34409837f3fe4ae5f2b0f9c4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 10f3989e8fa0f2b29e1aabdc9f2b6d8112217c3c34409837f3fe4ae5f2b0f9c4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 916 10f3989e8fa0f2b29e1aabdc9f2b6d8112217c3c34409837f3fe4ae5f2b0f9c4.exe 916 10f3989e8fa0f2b29e1aabdc9f2b6d8112217c3c34409837f3fe4ae5f2b0f9c4.exe 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1376 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 916 10f3989e8fa0f2b29e1aabdc9f2b6d8112217c3c34409837f3fe4ae5f2b0f9c4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10f3989e8fa0f2b29e1aabdc9f2b6d8112217c3c34409837f3fe4ae5f2b0f9c4.exe"C:\Users\Admin\AppData\Local\Temp\10f3989e8fa0f2b29e1aabdc9f2b6d8112217c3c34409837f3fe4ae5f2b0f9c4.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:916