Resubmissions
10/06/2023, 02:32
230610-c1gs6aea89 10Analysis
-
max time kernel
150s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10/06/2023, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
69ab392dfe42b299677871707364b4b59da9a4e466eda0065db4dc6da89f9321.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
69ab392dfe42b299677871707364b4b59da9a4e466eda0065db4dc6da89f9321.exe
Resource
win10v2004-20230220-en
General
-
Target
69ab392dfe42b299677871707364b4b59da9a4e466eda0065db4dc6da89f9321.exe
-
Size
276KB
-
MD5
dd30198ea41d5015bbb55030481bee96
-
SHA1
14c16216f39e98e509e1e2025bb0413fa1ecc3aa
-
SHA256
69ab392dfe42b299677871707364b4b59da9a4e466eda0065db4dc6da89f9321
-
SHA512
b2be031819f002c72a0fbc1ad5e4eeff4968a33fbb8dba8b3ad4bf1bfba2cbe6882cc6f5025cbf55643f1c799bd07a56761d0697ebceec496d28bf40a8dd1dbe
-
SSDEEP
3072:wCdRiliZsfO/cYB11Y0s78Qu+EI6w5Xjy3GjSPOVGfLBrje057oJRR:1RilhO/cYB1m78Q12wdjlSAG1rjUv
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 69ab392dfe42b299677871707364b4b59da9a4e466eda0065db4dc6da89f9321.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 69ab392dfe42b299677871707364b4b59da9a4e466eda0065db4dc6da89f9321.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 69ab392dfe42b299677871707364b4b59da9a4e466eda0065db4dc6da89f9321.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1920 69ab392dfe42b299677871707364b4b59da9a4e466eda0065db4dc6da89f9321.exe 1920 69ab392dfe42b299677871707364b4b59da9a4e466eda0065db4dc6da89f9321.exe 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1268 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1920 69ab392dfe42b299677871707364b4b59da9a4e466eda0065db4dc6da89f9321.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\69ab392dfe42b299677871707364b4b59da9a4e466eda0065db4dc6da89f9321.exe"C:\Users\Admin\AppData\Local\Temp\69ab392dfe42b299677871707364b4b59da9a4e466eda0065db4dc6da89f9321.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1920