Analysis
-
max time kernel
150s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
25/06/2023, 10:19
Static task
static1
Behavioral task
behavioral1
Sample
803b575609dcf243197d6aca0.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
803b575609dcf243197d6aca0.exe
Resource
win10v2004-20230621-en
General
-
Target
803b575609dcf243197d6aca0.exe
-
Size
206KB
-
MD5
803b575609dcf243197d6aca0d43dc15
-
SHA1
ca98e29c73c277c28b7984cf3a58bd50f4ddbba1
-
SHA256
c413d22d35cdb7d3f9dce3f99d4ec11ac07af420ac33a235acbb13344e56297e
-
SHA512
20f29452c0a09526f4ac260717829d9858c76f9800ad8fee0c2575230240ace05f62c9c9310a74b622e6b57710f8f0cfd2ea31d5b0dfa8404cccb525f8619f55
-
SSDEEP
3072:re83fy3NQC7rIOFwTQJryOdAY/0pZnnESqHOZPsPZdiR:J33C7rIOaQJpd50jnE/OZ0
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 803b575609dcf243197d6aca0.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 803b575609dcf243197d6aca0.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 803b575609dcf243197d6aca0.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 904 803b575609dcf243197d6aca0.exe 904 803b575609dcf243197d6aca0.exe 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1256 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 904 803b575609dcf243197d6aca0.exe