Analysis
-
max time kernel
135s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13-06-2023 01:08
Static task
static1
Behavioral task
behavioral1
Sample
b2c3517bb90933390df4eb01c6ba36f2a519a69b5bcee703f4889b8336cb7027.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b2c3517bb90933390df4eb01c6ba36f2a519a69b5bcee703f4889b8336cb7027.exe
Resource
win10v2004-20230220-en
General
-
Target
b2c3517bb90933390df4eb01c6ba36f2a519a69b5bcee703f4889b8336cb7027.exe
-
Size
241KB
-
MD5
7d726c8be35f9e9f010363c050ee86b3
-
SHA1
13d73cea5b8d05b338f347cdfc4088cc4f38fcac
-
SHA256
b2c3517bb90933390df4eb01c6ba36f2a519a69b5bcee703f4889b8336cb7027
-
SHA512
a99fd000bf852276d2722e7e75b9577dbac669a12c7db9e52965808aabc7710bfa3956de993f14154143db45ad124f4ed90255332171bb4df57c30707e0a042b
-
SSDEEP
3072:O98WPLTgdxkBH8ZQYTr6DQ6v+UT4i0JKIMuFes7P:XWzcdxkFhCwQC8bMuF
Malware Config
Extracted
smokeloader
summ
Extracted
smokeloader
2022
http://stalagmijesarl.com/
http://ukdantist-sarl.com/
http://cpcorprotationltd.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b2c3517bb90933390df4eb01c6ba36f2a519a69b5bcee703f4889b8336cb7027.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b2c3517bb90933390df4eb01c6ba36f2a519a69b5bcee703f4889b8336cb7027.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b2c3517bb90933390df4eb01c6ba36f2a519a69b5bcee703f4889b8336cb7027.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1972 b2c3517bb90933390df4eb01c6ba36f2a519a69b5bcee703f4889b8336cb7027.exe 1972 b2c3517bb90933390df4eb01c6ba36f2a519a69b5bcee703f4889b8336cb7027.exe 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1292 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1972 b2c3517bb90933390df4eb01c6ba36f2a519a69b5bcee703f4889b8336cb7027.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2c3517bb90933390df4eb01c6ba36f2a519a69b5bcee703f4889b8336cb7027.exe"C:\Users\Admin\AppData\Local\Temp\b2c3517bb90933390df4eb01c6ba36f2a519a69b5bcee703f4889b8336cb7027.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1972