Analysis
-
max time kernel
150s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
11/07/2023, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
80bd2aa57939a3d23aa8537f7447d5f19ec62141c17e72d410f73e22d33ac8e8.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
80bd2aa57939a3d23aa8537f7447d5f19ec62141c17e72d410f73e22d33ac8e8.exe
Resource
win10v2004-20230703-en
General
-
Target
80bd2aa57939a3d23aa8537f7447d5f19ec62141c17e72d410f73e22d33ac8e8.exe
-
Size
233KB
-
MD5
9d8e377b4474a6274d542c91acacd748
-
SHA1
a572895cc613591813551d558a1597b6280677ed
-
SHA256
80bd2aa57939a3d23aa8537f7447d5f19ec62141c17e72d410f73e22d33ac8e8
-
SHA512
6624a634db360457899bed7c42caa6782faac1edf54d5874c467969bfa37deaeb23baa14de227f0fec2e7d90f3e798f8bc5f2786f084325f156b4dbe108ed4a1
-
SSDEEP
3072:BF4IxGWhf4cxDQM8l7gf4B6TWKgIHBzsLACvkC1I2mVrcnr/4:wbWZ1EgfLOIKLAC3vmV
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 80bd2aa57939a3d23aa8537f7447d5f19ec62141c17e72d410f73e22d33ac8e8.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 80bd2aa57939a3d23aa8537f7447d5f19ec62141c17e72d410f73e22d33ac8e8.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 80bd2aa57939a3d23aa8537f7447d5f19ec62141c17e72d410f73e22d33ac8e8.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2052 80bd2aa57939a3d23aa8537f7447d5f19ec62141c17e72d410f73e22d33ac8e8.exe 2052 80bd2aa57939a3d23aa8537f7447d5f19ec62141c17e72d410f73e22d33ac8e8.exe 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1244 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2052 80bd2aa57939a3d23aa8537f7447d5f19ec62141c17e72d410f73e22d33ac8e8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80bd2aa57939a3d23aa8537f7447d5f19ec62141c17e72d410f73e22d33ac8e8.exe"C:\Users\Admin\AppData\Local\Temp\80bd2aa57939a3d23aa8537f7447d5f19ec62141c17e72d410f73e22d33ac8e8.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2052