Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2023, 18:00
Static task
static1
Behavioral task
behavioral1
Sample
7211f119a19a735056b60fd43deeebcb49354f3bf68b445938b301d61502c7e7_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7211f119a19a735056b60fd43deeebcb49354f3bf68b445938b301d61502c7e7_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
7211f119a19a735056b60fd43deeebcb49354f3bf68b445938b301d61502c7e7_JC.exe
-
Size
227KB
-
MD5
f10d1b0dfee5fba7074c8bda75dc6999
-
SHA1
3f3679bc81bf0da1c74b074e0c12c43bc75270b3
-
SHA256
7211f119a19a735056b60fd43deeebcb49354f3bf68b445938b301d61502c7e7
-
SHA512
0b208bc1ffb610f7b9573bbc9c2877ed3bd51451cb1b28e44162be7837a9ea67f8a609adddf4e765895e70f56fb1799e033cc1a132ecc985ea71d22bc293367c
-
SSDEEP
3072:1PoWZyAT6fNA200jLF6vTNbFyN3wE79Z5k4F2n/Q:V45VAojZ6xW3wECS2n
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://gudintas.at/tmp/
http://pik96.ru/tmp/
http://rosatiauto.com/tmp/
http://kingpirate.ru/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7211f119a19a735056b60fd43deeebcb49354f3bf68b445938b301d61502c7e7_JC.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7211f119a19a735056b60fd43deeebcb49354f3bf68b445938b301d61502c7e7_JC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7211f119a19a735056b60fd43deeebcb49354f3bf68b445938b301d61502c7e7_JC.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3348 7211f119a19a735056b60fd43deeebcb49354f3bf68b445938b301d61502c7e7_JC.exe 3348 7211f119a19a735056b60fd43deeebcb49354f3bf68b445938b301d61502c7e7_JC.exe 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3152 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3348 7211f119a19a735056b60fd43deeebcb49354f3bf68b445938b301d61502c7e7_JC.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3152 Process not Found -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7211f119a19a735056b60fd43deeebcb49354f3bf68b445938b301d61502c7e7_JC.exe"C:\Users\Admin\AppData\Local\Temp\7211f119a19a735056b60fd43deeebcb49354f3bf68b445938b301d61502c7e7_JC.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3348