Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19-06-2023 04:09
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
185KB
-
MD5
f50c7021faf8880c50cb092669bccf9b
-
SHA1
302d730bad4222d1748a863da3f8bf2368b88e65
-
SHA256
14a81d39c1a2260f7dde336245ab276a3416319e8bea2740107f8da6b5baecc2
-
SHA512
8544961a0ce6d2d2f6e2cd61b5d9be07cf23d3c1de0860008efc08ec7ed3594af21cfe575bf52aca1fcdda150c7a4fe3e2ea46c4bd8d9a6abaef0178d1be19d3
-
SSDEEP
3072:MtaBjZDS2BKsgTnZOXefxHgndnmBT7bZTDhYqgxAnLY:MgBNDfBKbZOXepHg9mBX9XhY5
Malware Config
Extracted
smokeloader
summ
Extracted
smokeloader
2022
http://stalagmijesarl.com/
http://ukdantist-sarl.com/
http://cpcorprotationltd.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
tmp.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tmp.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tmp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
tmp.exepid process 2040 tmp.exe 2040 tmp.exe 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1240 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
tmp.exepid process 2040 tmp.exe