Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15-04-2023 17:55
Static task
static1
Behavioral task
behavioral1
Sample
092a9e1942ac9f6d661c7f2316d96b49.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
092a9e1942ac9f6d661c7f2316d96b49.exe
Resource
win10v2004-20230220-en
General
-
Target
092a9e1942ac9f6d661c7f2316d96b49.exe
-
Size
351KB
-
MD5
092a9e1942ac9f6d661c7f2316d96b49
-
SHA1
652b33d8b1fb9a091eecd43ce22531138b63ac36
-
SHA256
c745107f1a0f024ea33897a3d05c8389e275b8c2023ebea867319f8d9d969a16
-
SHA512
3c21ea373cc97c1d54e5e955a5b58ea575b3fa2ccb1d3490016ee48acd5d4e17030f7d4afd4314a96a42c57723a4af0bdbde77d98e590c10429062e30cbaf00a
-
SSDEEP
3072:4Bk5CS5YYyHSO6IZKJCwCcMZKW8/T2mAZa1e7Z2J4+v0fB0wbC1tvDTV0crJ5yNH:8k2YkpWJCNwL2Gpi0ZTvDTV9sK4we4
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 092a9e1942ac9f6d661c7f2316d96b49.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 092a9e1942ac9f6d661c7f2316d96b49.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 092a9e1942ac9f6d661c7f2316d96b49.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 308 092a9e1942ac9f6d661c7f2316d96b49.exe 308 092a9e1942ac9f6d661c7f2316d96b49.exe 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found 1312 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1312 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 308 092a9e1942ac9f6d661c7f2316d96b49.exe