Analysis
-
max time kernel
150s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17/05/2023, 01:06
Static task
static1
Behavioral task
behavioral1
Sample
7edf6918a66629fd9d6eec6d6d66d17584cc3f0da69b87b63447d37c078b624c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7edf6918a66629fd9d6eec6d6d66d17584cc3f0da69b87b63447d37c078b624c.exe
Resource
win10v2004-20230221-en
General
-
Target
7edf6918a66629fd9d6eec6d6d66d17584cc3f0da69b87b63447d37c078b624c.exe
-
Size
234KB
-
MD5
48a7f8d73959fcf8e530113cc1873c2c
-
SHA1
117f9e66afda91a0016e908f62866b1ed25d6b59
-
SHA256
7edf6918a66629fd9d6eec6d6d66d17584cc3f0da69b87b63447d37c078b624c
-
SHA512
e6066699d3cc35a10a3c98ed27a6d0bba0c92a14168fb589fc5a71089fbb59688b7e7b21395165ca64028a8ae3b67532929f4717f5aa4e7b6e40f9c440bd356f
-
SSDEEP
3072:s2PQXiAM2g8imZ+q/yUNrD+yvgyp+kuO3SSHzO117NgmX6w/X0joFYJvKuZ:kXMmXFNf+HdO3SSTO11NgA680joAdZ
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7edf6918a66629fd9d6eec6d6d66d17584cc3f0da69b87b63447d37c078b624c.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7edf6918a66629fd9d6eec6d6d66d17584cc3f0da69b87b63447d37c078b624c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7edf6918a66629fd9d6eec6d6d66d17584cc3f0da69b87b63447d37c078b624c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1684 7edf6918a66629fd9d6eec6d6d66d17584cc3f0da69b87b63447d37c078b624c.exe 1684 7edf6918a66629fd9d6eec6d6d66d17584cc3f0da69b87b63447d37c078b624c.exe 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1228 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1684 7edf6918a66629fd9d6eec6d6d66d17584cc3f0da69b87b63447d37c078b624c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7edf6918a66629fd9d6eec6d6d66d17584cc3f0da69b87b63447d37c078b624c.exe"C:\Users\Admin\AppData\Local\Temp\7edf6918a66629fd9d6eec6d6d66d17584cc3f0da69b87b63447d37c078b624c.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1684