Analysis
-
max time kernel
199s -
max time network
224s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 19:05
Static task
static1
Behavioral task
behavioral1
Sample
ee0695e88b2430ef59373e6638c505a0ad298306e0989c25ea15d4735e90c4bf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ee0695e88b2430ef59373e6638c505a0ad298306e0989c25ea15d4735e90c4bf.exe
Resource
win10v2004-20230221-en
General
-
Target
ee0695e88b2430ef59373e6638c505a0ad298306e0989c25ea15d4735e90c4bf.exe
-
Size
326KB
-
MD5
a32c9253643c7ceb577c01c553c9855e
-
SHA1
a8e9b863779e156726694ec0a338c408fcb63ea2
-
SHA256
ee0695e88b2430ef59373e6638c505a0ad298306e0989c25ea15d4735e90c4bf
-
SHA512
6c08e969ab0d3339c7f06a8f32ad1679cdc827325a249add23e0d7785fdbce6b975acad7329e12b6ab1606c96ef5728411ac674ac52e2532ecb210a8b8af0134
-
SSDEEP
6144:fauRRJZdymVP+xWeXDxO92kKqj8wa71lz:yujLdymVPWWSD08kKqjMlz
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
http://aapu.at/tmp/
http://poudineh.com/tmp/
http://firsttrusteedrx.ru/tmp/
http://kingpirate.ru/tmp/
Extracted
vidar
3.6
1616034f091df9fd0229bc38dd17597f
https://steamcommunity.com/profiles/76561199499188534
https://t.me/nutalse
-
profile_id_v2
1616034f091df9fd0229bc38dd17597f
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36
Extracted
smokeloader
pub1
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 556 fftjhfh 3112 6C6C.exe 4960 A80F.exe 2320 B04D.exe 4864 C2DC.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A80F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C2DC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ee0695e88b2430ef59373e6638c505a0ad298306e0989c25ea15d4735e90c4bf.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ee0695e88b2430ef59373e6638c505a0ad298306e0989c25ea15d4735e90c4bf.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ee0695e88b2430ef59373e6638c505a0ad298306e0989c25ea15d4735e90c4bf.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fftjhfh Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A80F.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A80F.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C2DC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fftjhfh Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fftjhfh Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C2DC.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1620 ee0695e88b2430ef59373e6638c505a0ad298306e0989c25ea15d4735e90c4bf.exe 1620 ee0695e88b2430ef59373e6638c505a0ad298306e0989c25ea15d4735e90c4bf.exe 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found 760 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 760 Process not Found -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 1620 ee0695e88b2430ef59373e6638c505a0ad298306e0989c25ea15d4735e90c4bf.exe 556 fftjhfh 4960 A80F.exe 4864 C2DC.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 760 Process not Found Token: SeCreatePagefilePrivilege 760 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 760 wrote to memory of 3112 760 Process not Found 82 PID 760 wrote to memory of 3112 760 Process not Found 82 PID 760 wrote to memory of 3112 760 Process not Found 82 PID 760 wrote to memory of 4960 760 Process not Found 83 PID 760 wrote to memory of 4960 760 Process not Found 83 PID 760 wrote to memory of 4960 760 Process not Found 83 PID 760 wrote to memory of 2320 760 Process not Found 84 PID 760 wrote to memory of 2320 760 Process not Found 84 PID 760 wrote to memory of 2320 760 Process not Found 84 PID 760 wrote to memory of 4864 760 Process not Found 85 PID 760 wrote to memory of 4864 760 Process not Found 85 PID 760 wrote to memory of 4864 760 Process not Found 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee0695e88b2430ef59373e6638c505a0ad298306e0989c25ea15d4735e90c4bf.exe"C:\Users\Admin\AppData\Local\Temp\ee0695e88b2430ef59373e6638c505a0ad298306e0989c25ea15d4735e90c4bf.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1620
-
C:\Users\Admin\AppData\Roaming\fftjhfhC:\Users\Admin\AppData\Roaming\fftjhfh1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:556
-
C:\Users\Admin\AppData\Local\Temp\6C6C.exeC:\Users\Admin\AppData\Local\Temp\6C6C.exe1⤵
- Executes dropped EXE
PID:3112
-
C:\Users\Admin\AppData\Local\Temp\A80F.exeC:\Users\Admin\AppData\Local\Temp\A80F.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4960
-
C:\Users\Admin\AppData\Local\Temp\B04D.exeC:\Users\Admin\AppData\Local\Temp\B04D.exe1⤵
- Executes dropped EXE
PID:2320
-
C:\Users\Admin\AppData\Local\Temp\C2DC.exeC:\Users\Admin\AppData\Local\Temp\C2DC.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4864
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
465KB
MD575c244e85bf8d76db3937fa629375bad
SHA12c954e838b870ebb1996747ccebc577efa34a7e9
SHA25638ce7804dfdc1596c2a26d83a6097a837e6c7787b88de3ed781aae12e07f52d7
SHA512f0da9a192ed89073b54489a49cd4f8b2fb6447bc63190108551b68cc982dcd85b4afa2f3ac6a107c897fae39f22195e6e677b1888e3e2b2bd8c06e8dbb35a5d1
-
Filesize
465KB
MD575c244e85bf8d76db3937fa629375bad
SHA12c954e838b870ebb1996747ccebc577efa34a7e9
SHA25638ce7804dfdc1596c2a26d83a6097a837e6c7787b88de3ed781aae12e07f52d7
SHA512f0da9a192ed89073b54489a49cd4f8b2fb6447bc63190108551b68cc982dcd85b4afa2f3ac6a107c897fae39f22195e6e677b1888e3e2b2bd8c06e8dbb35a5d1
-
Filesize
302KB
MD5d58dfbdbe93d7f560ee6380e69e8b7e5
SHA1e1799582e614a844b32424ca2660a20a0a84ccba
SHA256fac94fa8922c5efe57ca98c4a0b78de5541ec4ef0084f33b3e9e19550d2b05ea
SHA512d364b93d33d53210e2abd6ab7c0c1f8fcf588b8ff2f94f0285564a8eb8b26c6ca8da7e135f876ba1cb5f6b9eb08f3ea6c40b169ea2909f0a2eb5f4d7684b793f
-
Filesize
302KB
MD5d58dfbdbe93d7f560ee6380e69e8b7e5
SHA1e1799582e614a844b32424ca2660a20a0a84ccba
SHA256fac94fa8922c5efe57ca98c4a0b78de5541ec4ef0084f33b3e9e19550d2b05ea
SHA512d364b93d33d53210e2abd6ab7c0c1f8fcf588b8ff2f94f0285564a8eb8b26c6ca8da7e135f876ba1cb5f6b9eb08f3ea6c40b169ea2909f0a2eb5f4d7684b793f
-
Filesize
4.3MB
MD58baba9f71070bcdfd468a74b7f7eafc1
SHA1274bd5c3c32b447d020e287f7e875e3d03db8090
SHA2565c3fac8232556a1019977e05b02665b342ad523a9f11882468b9de6207bd241f
SHA51271bbd0d3df063e3ecce13754f9b283afde43e23fa6efec343cf5f0368d2e3e673e6b9d813da76e27ce39d1353af6815b72916e27c1ccc03e9d6572d28501154a
-
Filesize
4.3MB
MD58baba9f71070bcdfd468a74b7f7eafc1
SHA1274bd5c3c32b447d020e287f7e875e3d03db8090
SHA2565c3fac8232556a1019977e05b02665b342ad523a9f11882468b9de6207bd241f
SHA51271bbd0d3df063e3ecce13754f9b283afde43e23fa6efec343cf5f0368d2e3e673e6b9d813da76e27ce39d1353af6815b72916e27c1ccc03e9d6572d28501154a
-
Filesize
302KB
MD5d58dfbdbe93d7f560ee6380e69e8b7e5
SHA1e1799582e614a844b32424ca2660a20a0a84ccba
SHA256fac94fa8922c5efe57ca98c4a0b78de5541ec4ef0084f33b3e9e19550d2b05ea
SHA512d364b93d33d53210e2abd6ab7c0c1f8fcf588b8ff2f94f0285564a8eb8b26c6ca8da7e135f876ba1cb5f6b9eb08f3ea6c40b169ea2909f0a2eb5f4d7684b793f
-
Filesize
302KB
MD5d58dfbdbe93d7f560ee6380e69e8b7e5
SHA1e1799582e614a844b32424ca2660a20a0a84ccba
SHA256fac94fa8922c5efe57ca98c4a0b78de5541ec4ef0084f33b3e9e19550d2b05ea
SHA512d364b93d33d53210e2abd6ab7c0c1f8fcf588b8ff2f94f0285564a8eb8b26c6ca8da7e135f876ba1cb5f6b9eb08f3ea6c40b169ea2909f0a2eb5f4d7684b793f
-
Filesize
326KB
MD5a32c9253643c7ceb577c01c553c9855e
SHA1a8e9b863779e156726694ec0a338c408fcb63ea2
SHA256ee0695e88b2430ef59373e6638c505a0ad298306e0989c25ea15d4735e90c4bf
SHA5126c08e969ab0d3339c7f06a8f32ad1679cdc827325a249add23e0d7785fdbce6b975acad7329e12b6ab1606c96ef5728411ac674ac52e2532ecb210a8b8af0134
-
Filesize
326KB
MD5a32c9253643c7ceb577c01c553c9855e
SHA1a8e9b863779e156726694ec0a338c408fcb63ea2
SHA256ee0695e88b2430ef59373e6638c505a0ad298306e0989c25ea15d4735e90c4bf
SHA5126c08e969ab0d3339c7f06a8f32ad1679cdc827325a249add23e0d7785fdbce6b975acad7329e12b6ab1606c96ef5728411ac674ac52e2532ecb210a8b8af0134