Analysis
-
max time kernel
151s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:04
Static task
static1
Behavioral task
behavioral1
Sample
28f401c060cfab709a9cda8e451ce5f9469f92fbe98907b35cfb4c5c5e940829.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
28f401c060cfab709a9cda8e451ce5f9469f92fbe98907b35cfb4c5c5e940829.exe
Resource
win10v2004-20230220-en
General
-
Target
28f401c060cfab709a9cda8e451ce5f9469f92fbe98907b35cfb4c5c5e940829.exe
-
Size
291KB
-
MD5
c3de2bee9d934526001ac3ed817b2e3c
-
SHA1
0abff21d42f7033f8cd9bbcb4a70ebe756cfdc1e
-
SHA256
28f401c060cfab709a9cda8e451ce5f9469f92fbe98907b35cfb4c5c5e940829
-
SHA512
2aa95d661588908c3e2bc9de56067d0b9925599c55828847c4a713fd965df6f8d3731d5193eadc2fe1cd87f08d3f4351d018bcafbe68bd50a81174e79268c823
-
SSDEEP
3072:JOG/VMOWDA3PFOKiadstXHv4wHT2Vqbuic5RTdN7wxgMCHdXn:/WDyxds5Hv4wCVwwTdN371
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 28f401c060cfab709a9cda8e451ce5f9469f92fbe98907b35cfb4c5c5e940829.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 28f401c060cfab709a9cda8e451ce5f9469f92fbe98907b35cfb4c5c5e940829.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 28f401c060cfab709a9cda8e451ce5f9469f92fbe98907b35cfb4c5c5e940829.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1100 28f401c060cfab709a9cda8e451ce5f9469f92fbe98907b35cfb4c5c5e940829.exe 1100 28f401c060cfab709a9cda8e451ce5f9469f92fbe98907b35cfb4c5c5e940829.exe 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1292 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1100 28f401c060cfab709a9cda8e451ce5f9469f92fbe98907b35cfb4c5c5e940829.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\28f401c060cfab709a9cda8e451ce5f9469f92fbe98907b35cfb4c5c5e940829.exe"C:\Users\Admin\AppData\Local\Temp\28f401c060cfab709a9cda8e451ce5f9469f92fbe98907b35cfb4c5c5e940829.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1100