Analysis
-
max time kernel
150s -
max time network
29s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
25/06/2023, 11:13
Static task
static1
Behavioral task
behavioral1
Sample
d76a9b8e3f5c64f27e81543c218327bd.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
d76a9b8e3f5c64f27e81543c218327bd.exe
Resource
win10v2004-20230621-en
General
-
Target
d76a9b8e3f5c64f27e81543c218327bd.exe
-
Size
206KB
-
MD5
d76a9b8e3f5c64f27e81543c218327bd
-
SHA1
a1c7ca2caaeb2308639946f60cf500a13beeff4a
-
SHA256
c8d9d36cfd174f400bca54c388092d3cd03e36d4e4c11368fca86b09bac5cbed
-
SHA512
5e74ffee7f0926a15485a25690131be28fc305e228522c730b8dbfe7b7966b38dccb6fc1f70aa5d80f8140bd9b436a76fb5c50e4bebb5f534d903e098cf601b8
-
SSDEEP
3072:s0t8T8nKrRkTcT1x/oTjZCTiwf0t3dfC+8gOuiRv+nJ+08Mr:0TWTqx/oYzqZCSOD/
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d76a9b8e3f5c64f27e81543c218327bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d76a9b8e3f5c64f27e81543c218327bd.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d76a9b8e3f5c64f27e81543c218327bd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1572 d76a9b8e3f5c64f27e81543c218327bd.exe 1572 d76a9b8e3f5c64f27e81543c218327bd.exe 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1188 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1572 d76a9b8e3f5c64f27e81543c218327bd.exe