Analysis
-
max time kernel
36s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2023, 05:29
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
296KB
-
MD5
2273853089e50bd583c82ba8ac5328e4
-
SHA1
7723ef15cd45c675eeba8a82356042830e720b82
-
SHA256
421598a5b3994cd97d39509c4a09207bd2b8ed3deeab1338ebfded4d502aeaae
-
SHA512
8b875636e941be970d30185c7c46b54604e892c78a85c1109356175a301f7d568268b1ddf19ba54b1f64b9216e46a6b4f7c75efd7c0716209c88fb4e4b3ba4ee
-
SSDEEP
3072:lFJUOsBCsBLIs6hFpS0wFfRcFz3JBy1IQPdT0lc8c0o/Ehi7SnLw:DJUOqCELIs6HpShcFrJYTdo+zf/Cx
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://gudintas.at/tmp/
http://pik96.ru/tmp/
http://rosatiauto.com/tmp/
http://kingpirate.ru/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 1 IoCs
pid Process 1828 vctawih -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4864 file.exe 4864 file.exe 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4864 file.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4864
-
C:\Users\Admin\AppData\Roaming\vctawihC:\Users\Admin\AppData\Roaming\vctawih1⤵
- Executes dropped EXE
PID:1828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296KB
MD52273853089e50bd583c82ba8ac5328e4
SHA17723ef15cd45c675eeba8a82356042830e720b82
SHA256421598a5b3994cd97d39509c4a09207bd2b8ed3deeab1338ebfded4d502aeaae
SHA5128b875636e941be970d30185c7c46b54604e892c78a85c1109356175a301f7d568268b1ddf19ba54b1f64b9216e46a6b4f7c75efd7c0716209c88fb4e4b3ba4ee
-
Filesize
296KB
MD52273853089e50bd583c82ba8ac5328e4
SHA17723ef15cd45c675eeba8a82356042830e720b82
SHA256421598a5b3994cd97d39509c4a09207bd2b8ed3deeab1338ebfded4d502aeaae
SHA5128b875636e941be970d30185c7c46b54604e892c78a85c1109356175a301f7d568268b1ddf19ba54b1f64b9216e46a6b4f7c75efd7c0716209c88fb4e4b3ba4ee