Analysis
-
max time kernel
30s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02/10/2023, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
214f0eb7e4c38be352f97de7b9138442dd3e1cdc35a374d7d4bc03437b368dd0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
214f0eb7e4c38be352f97de7b9138442dd3e1cdc35a374d7d4bc03437b368dd0.exe
Resource
win10v2004-20230915-en
General
-
Target
214f0eb7e4c38be352f97de7b9138442dd3e1cdc35a374d7d4bc03437b368dd0.exe
-
Size
195KB
-
MD5
c4ffe0ca666bd8ed2fdc7113d84e0424
-
SHA1
9947410e96b9e3ec92a3f3eaea8e112fa2471660
-
SHA256
214f0eb7e4c38be352f97de7b9138442dd3e1cdc35a374d7d4bc03437b368dd0
-
SHA512
a317f8de39bffd91990dc38b68f7954d70611f216040d30d9574f6dd45743cf9f890b69893bfb3da0be4fd5dd3c6e546663e10e78bee3bb02b7c013ae12c2e83
-
SSDEEP
3072:YUpRqLce8JTIcXzuAeznmGEXnowIhZrShS5/eI23Y:yF8J8ca5LwIhZeO
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1200 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 214f0eb7e4c38be352f97de7b9138442dd3e1cdc35a374d7d4bc03437b368dd0.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 214f0eb7e4c38be352f97de7b9138442dd3e1cdc35a374d7d4bc03437b368dd0.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 214f0eb7e4c38be352f97de7b9138442dd3e1cdc35a374d7d4bc03437b368dd0.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2412 214f0eb7e4c38be352f97de7b9138442dd3e1cdc35a374d7d4bc03437b368dd0.exe 2412 214f0eb7e4c38be352f97de7b9138442dd3e1cdc35a374d7d4bc03437b368dd0.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1200 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2412 214f0eb7e4c38be352f97de7b9138442dd3e1cdc35a374d7d4bc03437b368dd0.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\214f0eb7e4c38be352f97de7b9138442dd3e1cdc35a374d7d4bc03437b368dd0.exe"C:\Users\Admin\AppData\Local\Temp\214f0eb7e4c38be352f97de7b9138442dd3e1cdc35a374d7d4bc03437b368dd0.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2412