Analysis
-
max time kernel
150s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
12-04-2023 13:09
Static task
static1
Behavioral task
behavioral1
Sample
d0a7d700851f79d277edb894d255d857.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d0a7d700851f79d277edb894d255d857.exe
Resource
win10v2004-20230220-en
General
-
Target
d0a7d700851f79d277edb894d255d857.exe
-
Size
212KB
-
MD5
d0a7d700851f79d277edb894d255d857
-
SHA1
bdabd3986483dcf95be18c4057d1f0f7909e6f6e
-
SHA256
74b1fba94544e5ef79c8907d2c5e392b6b0f948f08e445a940239a7d0ec1eca8
-
SHA512
e3d4160a3e818d0ad71a02ba2d3d51bf25aca0a12d2849cf7ab1363fd0d17ed6168471e6fe5053a3f5108819f139ca113503408ec9a03aaf300a1e4d00d36086
-
SSDEEP
3072:2tYU/l+KhAGQmMDMXnV7DasXIyZsBOGOq4cKVAMDfs5t1W0bLv:WYUt+wQmB3V66sEGocHG8R
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d0a7d700851f79d277edb894d255d857.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d0a7d700851f79d277edb894d255d857.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d0a7d700851f79d277edb894d255d857.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1992 d0a7d700851f79d277edb894d255d857.exe 1992 d0a7d700851f79d277edb894d255d857.exe 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1188 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1992 d0a7d700851f79d277edb894d255d857.exe