Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2023, 06:55
Static task
static1
Behavioral task
behavioral1
Sample
901d3bacbe82db5382c4f653e.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
901d3bacbe82db5382c4f653e.exe
Resource
win10v2004-20230621-en
General
-
Target
901d3bacbe82db5382c4f653e.exe
-
Size
195KB
-
MD5
bdc9638a416ebf6fc74591b45a068b3b
-
SHA1
00c356ba19871c862e463cb8d3a779b2a176a318
-
SHA256
901d3bacbe82db5382c4f653efb11d4784254b3ad727530c73ae327b734c1a4b
-
SHA512
10d52ffbbbf880149ac5359098ceeb2ffbfaf21cfb3d4af0a0bcfc86244c4c9bfd5031a1094459da541892cbf910fbfcdcfb91b60d814e764c252f38a360931c
-
SSDEEP
3072:nXKPXqLzLOimXGnE5MImRO3zPZZb984BCVlVZhlt:XTzLCGnWmRSZZbTKvr
Malware Config
Extracted
smokeloader
pub2
Extracted
smokeloader
2022
http://vatra.at/tmp/
http://spbdg.ru/tmp/
http://skinndia.com/tmp/
http://cracker.biz/tmp/
http://piratia-life.ru/tmp/
http://piratia.su/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 901d3bacbe82db5382c4f653e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 901d3bacbe82db5382c4f653e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 901d3bacbe82db5382c4f653e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1940 901d3bacbe82db5382c4f653e.exe 1940 901d3bacbe82db5382c4f653e.exe 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3216 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1940 901d3bacbe82db5382c4f653e.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.