Analysis
-
max time kernel
151s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18-06-2023 11:07
Static task
static1
Behavioral task
behavioral1
Sample
06549799.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
06549799.exe
Resource
win10v2004-20230220-en
General
-
Target
06549799.exe
-
Size
241KB
-
MD5
7d726c8be35f9e9f010363c050ee86b3
-
SHA1
13d73cea5b8d05b338f347cdfc4088cc4f38fcac
-
SHA256
b2c3517bb90933390df4eb01c6ba36f2a519a69b5bcee703f4889b8336cb7027
-
SHA512
a99fd000bf852276d2722e7e75b9577dbac669a12c7db9e52965808aabc7710bfa3956de993f14154143db45ad124f4ed90255332171bb4df57c30707e0a042b
-
SSDEEP
3072:O98WPLTgdxkBH8ZQYTr6DQ6v+UT4i0JKIMuFes7P:XWzcdxkFhCwQC8bMuF
Malware Config
Extracted
smokeloader
summ
Extracted
smokeloader
2022
http://stalagmijesarl.com/
http://ukdantist-sarl.com/
http://cpcorprotationltd.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
06549799.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 06549799.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 06549799.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 06549799.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
06549799.exepid process 920 06549799.exe 920 06549799.exe 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1268 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
06549799.exepid process 920 06549799.exe