Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2023, 02:04
Static task
static1
Behavioral task
behavioral1
Sample
69a871ba7d2670d162b2feffd9665fcebc4101a47d7892be98c3abbd602573d9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
69a871ba7d2670d162b2feffd9665fcebc4101a47d7892be98c3abbd602573d9.exe
Resource
win10v2004-20230915-en
General
-
Target
69a871ba7d2670d162b2feffd9665fcebc4101a47d7892be98c3abbd602573d9.exe
-
Size
253KB
-
MD5
afcfdec7f1675a6b234d4ac2983327d6
-
SHA1
26fedfcffeb4514a65b5fe05676eb1e9d0c6eec8
-
SHA256
69a871ba7d2670d162b2feffd9665fcebc4101a47d7892be98c3abbd602573d9
-
SHA512
60209244040826bbedf10e345e6ef1ac3fa0c44270cc0aa21b4e12ae84fe5858412994957003b9bcd8ac24e0618c40412e3bb2fa5b591082f67fcb97a97d9a0f
-
SSDEEP
3072:Ze1mM1SeATLuEayh1M8yOINUQjwAccQNZiVWZ5AYShN:DMMeAbayL7IWQwA9QrOu55
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://taibi.at/tmp/
http://01stroy.ru/tmp/
http://mal-net.com/tmp/
http://gromograd.ru/tmp/
http://kingpirate.ru/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 69a871ba7d2670d162b2feffd9665fcebc4101a47d7892be98c3abbd602573d9.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 69a871ba7d2670d162b2feffd9665fcebc4101a47d7892be98c3abbd602573d9.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 69a871ba7d2670d162b2feffd9665fcebc4101a47d7892be98c3abbd602573d9.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3816 69a871ba7d2670d162b2feffd9665fcebc4101a47d7892be98c3abbd602573d9.exe 3816 69a871ba7d2670d162b2feffd9665fcebc4101a47d7892be98c3abbd602573d9.exe 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3172 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3816 69a871ba7d2670d162b2feffd9665fcebc4101a47d7892be98c3abbd602573d9.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 3172 Process not Found Token: SeCreatePagefilePrivilege 3172 Process not Found Token: SeShutdownPrivilege 3172 Process not Found Token: SeCreatePagefilePrivilege 3172 Process not Found Token: SeShutdownPrivilege 3172 Process not Found Token: SeCreatePagefilePrivilege 3172 Process not Found Token: SeShutdownPrivilege 3172 Process not Found Token: SeCreatePagefilePrivilege 3172 Process not Found Token: SeShutdownPrivilege 3172 Process not Found Token: SeCreatePagefilePrivilege 3172 Process not Found Token: SeShutdownPrivilege 3172 Process not Found Token: SeCreatePagefilePrivilege 3172 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3172 Process not Found -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\69a871ba7d2670d162b2feffd9665fcebc4101a47d7892be98c3abbd602573d9.exe"C:\Users\Admin\AppData\Local\Temp\69a871ba7d2670d162b2feffd9665fcebc4101a47d7892be98c3abbd602573d9.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3816