Analysis
-
max time kernel
150s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18/05/2023, 09:57
Static task
static1
Behavioral task
behavioral1
Sample
extractor.dll.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
extractor.dll.exe
Resource
win10v2004-20230220-en
General
-
Target
extractor.dll.exe
-
Size
233KB
-
MD5
969494d4ac3458f140d66a5cd4480168
-
SHA1
e684fc2d1ca51bf824369441ee0427239ef1b7c3
-
SHA256
ca2feed6034490fafa3d63a5453668d5d5deb26c27f46060eea2cf0ba0eaf849
-
SHA512
805ded7fe5fa7896d0c703d6cbfeddb19840411a40b909b9371cd1220e7e4034d961576e70c3eb148e031fdf397539d26aa08c7d27df88fe6aca5e676a29703d
-
SSDEEP
3072:LIwln07kmMToWSnts2KWg3OmRlawhdstffVH/JXKoJQxKekaZ9JFU/3:0WC23OOlaWIfazkaj+3
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI extractor.dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI extractor.dll.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI extractor.dll.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1780 extractor.dll.exe 1780 extractor.dll.exe 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1264 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1780 extractor.dll.exe