Resubmissions
05/09/2023, 18:45
230905-xd8zcaaf23 1024/05/2023, 16:27
230524-tylsrsdh3w 1024/05/2023, 14:44
230524-r344ssch85 1024/05/2023, 14:29
230524-rty67ach46 10Analysis
-
max time kernel
126s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
24/05/2023, 14:29
Behavioral task
behavioral1
Sample
0ab54468721453d7237df27d4dd6383366edb5cc3bfab9a20d48a2416ca2aed8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0ab54468721453d7237df27d4dd6383366edb5cc3bfab9a20d48a2416ca2aed8.exe
Resource
win10v2004-20230220-en
General
-
Target
0ab54468721453d7237df27d4dd6383366edb5cc3bfab9a20d48a2416ca2aed8.exe
-
Size
30KB
-
MD5
f8610249fff7b405c3736886c6f2e80c
-
SHA1
14c51222c238d26169c19f9e0fe89b47c5d65d5d
-
SHA256
0ab54468721453d7237df27d4dd6383366edb5cc3bfab9a20d48a2416ca2aed8
-
SHA512
1f85357f86b3ce03ffb43ae601ebe3a8741b87affcb5dd32939e93441043ab5303ab3051276d9c9d8bfd7acc8bc0aceb127a5111bee60bc5d67d6102e1c3d0e5
-
SSDEEP
384:uHEOWu0OUQJEWCQ8iHknV2dtMmsxRR+vUQCy/oZ893h8MTQGTjshKi8rpUaJ/aX2:FgJEdQhX7MXR+9/oZu3h1sGTjY6/hu
Malware Config
Extracted
smokeloader
0016
Extracted
smokeloader
2022
https://miami-golf-club.com/search.php
https://seattle-fishing-club.com/search.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0ab54468721453d7237df27d4dd6383366edb5cc3bfab9a20d48a2416ca2aed8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0ab54468721453d7237df27d4dd6383366edb5cc3bfab9a20d48a2416ca2aed8.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0ab54468721453d7237df27d4dd6383366edb5cc3bfab9a20d48a2416ca2aed8.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 916 0ab54468721453d7237df27d4dd6383366edb5cc3bfab9a20d48a2416ca2aed8.exe 916 0ab54468721453d7237df27d4dd6383366edb5cc3bfab9a20d48a2416ca2aed8.exe 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1376 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 916 0ab54468721453d7237df27d4dd6383366edb5cc3bfab9a20d48a2416ca2aed8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ab54468721453d7237df27d4dd6383366edb5cc3bfab9a20d48a2416ca2aed8.exe"C:\Users\Admin\AppData\Local\Temp\0ab54468721453d7237df27d4dd6383366edb5cc3bfab9a20d48a2416ca2aed8.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:916