Analysis
-
max time kernel
150s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
04/07/2023, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
0f1c6993c8e12fb7d682678d08dbf384ed86b180951ee820026785dcca2c31c2.exe
Resource
win7-20230703-en
General
-
Target
0f1c6993c8e12fb7d682678d08dbf384ed86b180951ee820026785dcca2c31c2.exe
-
Size
198KB
-
MD5
f83a09c239532b8da9cd200ecb014072
-
SHA1
9a982a5dd3661e128f2958c9aded9d08804a51fd
-
SHA256
0f1c6993c8e12fb7d682678d08dbf384ed86b180951ee820026785dcca2c31c2
-
SHA512
4edd6aa86496447dc868d373ba746ddd7c468dd7114c59a65d4e5c7a4f96b85461b85caa2ed3d377c62a16f2e2df2a6c74e152458c8b53ec8a139bbbaabd2922
-
SSDEEP
3072:FWJqLmLYgTsexSVbkZL6nHGk7vUAwjKugD5lTvIsD:YsLmLoexSVbm6mOvUA0cTvIE
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0f1c6993c8e12fb7d682678d08dbf384ed86b180951ee820026785dcca2c31c2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0f1c6993c8e12fb7d682678d08dbf384ed86b180951ee820026785dcca2c31c2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0f1c6993c8e12fb7d682678d08dbf384ed86b180951ee820026785dcca2c31c2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1352 0f1c6993c8e12fb7d682678d08dbf384ed86b180951ee820026785dcca2c31c2.exe 1352 0f1c6993c8e12fb7d682678d08dbf384ed86b180951ee820026785dcca2c31c2.exe 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1196 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1352 0f1c6993c8e12fb7d682678d08dbf384ed86b180951ee820026785dcca2c31c2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f1c6993c8e12fb7d682678d08dbf384ed86b180951ee820026785dcca2c31c2.exe"C:\Users\Admin\AppData\Local\Temp\0f1c6993c8e12fb7d682678d08dbf384ed86b180951ee820026785dcca2c31c2.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1352