Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
30/06/2023, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
172c676aad88fff72547aca0af781610bc968d2d60dab00d7d76319d5d53bf53.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
172c676aad88fff72547aca0af781610bc968d2d60dab00d7d76319d5d53bf53.exe
Resource
win10v2004-20230621-en
General
-
Target
172c676aad88fff72547aca0af781610bc968d2d60dab00d7d76319d5d53bf53.exe
-
Size
305KB
-
MD5
912b005e323c1fea5f194bb3a75164db
-
SHA1
5afae053b0c4fedfca67fffd76c307ea83d54ce3
-
SHA256
172c676aad88fff72547aca0af781610bc968d2d60dab00d7d76319d5d53bf53
-
SHA512
ac025e651ef64794cfd308a9f6dff3990de1ca56fbf22a0112e30814ed9e1ec818f3b185a9cc78a75894ae690036a86169fb4d297c7488c573aface723340096
-
SSDEEP
3072:dlSVA2QFiighAwN+9wbiUg3uLWCLj5Py/r:SVlQFiiaFsuXxy/
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 172c676aad88fff72547aca0af781610bc968d2d60dab00d7d76319d5d53bf53.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 172c676aad88fff72547aca0af781610bc968d2d60dab00d7d76319d5d53bf53.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 172c676aad88fff72547aca0af781610bc968d2d60dab00d7d76319d5d53bf53.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2040 172c676aad88fff72547aca0af781610bc968d2d60dab00d7d76319d5d53bf53.exe 2040 172c676aad88fff72547aca0af781610bc968d2d60dab00d7d76319d5d53bf53.exe 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1196 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2040 172c676aad88fff72547aca0af781610bc968d2d60dab00d7d76319d5d53bf53.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\172c676aad88fff72547aca0af781610bc968d2d60dab00d7d76319d5d53bf53.exe"C:\Users\Admin\AppData\Local\Temp\172c676aad88fff72547aca0af781610bc968d2d60dab00d7d76319d5d53bf53.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2040