Analysis

  • max time kernel
    150s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2023, 00:46 UTC

General

  • Target

    file.exe

  • Size

    297KB

  • MD5

    0d2a685371d89d29d50a80906b585927

  • SHA1

    0593ad6b9d021032cf2a6820113ecdff7b2e13c9

  • SHA256

    3bb00bf2f33f0ea786f25d5fb6364599e87fa4dfa6c23caf48d67437db74dff2

  • SHA512

    1a96f8fb22db11769b97fd26cac7c87e62f5401092f47f99954de16d1a2d5e3faebab07931aa85a069eb12395b834fa389076202e388ddac483ea9ce9ac8436f

  • SSDEEP

    6144:7TuM28uLdG9gmJRrqS7xSimsyPtpKDi0Btc:7TJ28uZG9gkRn7EigYBt

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://potunulit.org/

http://hutnilior.net/

http://bulimu55t.net/

http://soryytlic4.net/

http://novanosa5org.org/

http://nuljjjnuli.org/

http://tolilolihul.net/

http://somatoka51hub.net/

http://hujukui3.net/

http://bukubuka1.net/

http://golilopaster.org/

http://newzelannd66.org/

http://otriluyttn.org/

rc4.i32
1
0xcc4f5fd4
rc4.i32
1
0x2a68f03e

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1748

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1192-56-0x0000000002960000-0x0000000002976000-memory.dmp

    Filesize

    88KB

  • memory/1748-55-0x0000000000220000-0x0000000000229000-memory.dmp

    Filesize

    36KB

  • memory/1748-57-0x0000000000400000-0x0000000002366000-memory.dmp

    Filesize

    31.4MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.