Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18-04-2023 05:51
Static task
static1
Behavioral task
behavioral1
Sample
86b53cd192fa456ba8b43cf9ebcd8114.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
86b53cd192fa456ba8b43cf9ebcd8114.exe
Resource
win10v2004-20230220-en
General
-
Target
86b53cd192fa456ba8b43cf9ebcd8114.exe
-
Size
212KB
-
MD5
86b53cd192fa456ba8b43cf9ebcd8114
-
SHA1
a4e6ad049b232135a985785e5d1ed95f3c34996f
-
SHA256
d27e613f196c65e51a932e3a4994aeef5e4ea13003b2d75e86fd0bceeecb7012
-
SHA512
66ce65bf99536156fd8c85d1fe4b865578185fa7f2f53ec7834a199b229cc7dd663ae426f136bde6a8b7393c374a98bd8bfced842d91c2b63f76be96467b0cab
-
SSDEEP
3072:ndsupSR7MzPu27G0TOIZLqtn9TAS9kxD5VsldrsI7iMWLv:3m7MzPu2q+FVwd19OPs/D7iMOv
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 86b53cd192fa456ba8b43cf9ebcd8114.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 86b53cd192fa456ba8b43cf9ebcd8114.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 86b53cd192fa456ba8b43cf9ebcd8114.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1744 86b53cd192fa456ba8b43cf9ebcd8114.exe 1744 86b53cd192fa456ba8b43cf9ebcd8114.exe 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1236 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1744 86b53cd192fa456ba8b43cf9ebcd8114.exe