Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
19/09/2023, 02:04
Static task
static1
Behavioral task
behavioral1
Sample
69a871ba7d2670d162b2feffd9665fcebc4101a47d7892be98c3abbd602573d9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
69a871ba7d2670d162b2feffd9665fcebc4101a47d7892be98c3abbd602573d9.exe
Resource
win10v2004-20230915-en
General
-
Target
69a871ba7d2670d162b2feffd9665fcebc4101a47d7892be98c3abbd602573d9.exe
-
Size
253KB
-
MD5
afcfdec7f1675a6b234d4ac2983327d6
-
SHA1
26fedfcffeb4514a65b5fe05676eb1e9d0c6eec8
-
SHA256
69a871ba7d2670d162b2feffd9665fcebc4101a47d7892be98c3abbd602573d9
-
SHA512
60209244040826bbedf10e345e6ef1ac3fa0c44270cc0aa21b4e12ae84fe5858412994957003b9bcd8ac24e0618c40412e3bb2fa5b591082f67fcb97a97d9a0f
-
SSDEEP
3072:Ze1mM1SeATLuEayh1M8yOINUQjwAccQNZiVWZ5AYShN:DMMeAbayL7IWQwA9QrOu55
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://taibi.at/tmp/
http://01stroy.ru/tmp/
http://mal-net.com/tmp/
http://gromograd.ru/tmp/
http://kingpirate.ru/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1192 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 69a871ba7d2670d162b2feffd9665fcebc4101a47d7892be98c3abbd602573d9.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 69a871ba7d2670d162b2feffd9665fcebc4101a47d7892be98c3abbd602573d9.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 69a871ba7d2670d162b2feffd9665fcebc4101a47d7892be98c3abbd602573d9.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2444 69a871ba7d2670d162b2feffd9665fcebc4101a47d7892be98c3abbd602573d9.exe 2444 69a871ba7d2670d162b2feffd9665fcebc4101a47d7892be98c3abbd602573d9.exe 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found 1192 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1192 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2444 69a871ba7d2670d162b2feffd9665fcebc4101a47d7892be98c3abbd602573d9.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\69a871ba7d2670d162b2feffd9665fcebc4101a47d7892be98c3abbd602573d9.exe"C:\Users\Admin\AppData\Local\Temp\69a871ba7d2670d162b2feffd9665fcebc4101a47d7892be98c3abbd602573d9.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2444