Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
05/10/2023, 13:36
Static task
static1
Behavioral task
behavioral1
Sample
43d11ecc336a1f109ac2084558a1a46e0b98bf6ebde333d59d4348a38564363e.exe
Resource
win10-20230915-en
General
-
Target
43d11ecc336a1f109ac2084558a1a46e0b98bf6ebde333d59d4348a38564363e.exe
-
Size
194KB
-
MD5
739b3c4af25959f827db886f8e998086
-
SHA1
cf4a56894d216b855f66bbc88e360970be1cbe47
-
SHA256
43d11ecc336a1f109ac2084558a1a46e0b98bf6ebde333d59d4348a38564363e
-
SHA512
0abaac5cb35895827377480dcd367384b14093ad83282f7bd13c30bb756ec9f173ca5d781070e23b85d15d661e442fb832d9a0317a61a69920f9250ac17fbb17
-
SSDEEP
3072:lmVtHfMyMR16nmtMq7jMKkWbl1kIwQSYLuoZXAX5I:kVtHhoQmt17jVsIHJ
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3196 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 43d11ecc336a1f109ac2084558a1a46e0b98bf6ebde333d59d4348a38564363e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 43d11ecc336a1f109ac2084558a1a46e0b98bf6ebde333d59d4348a38564363e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 43d11ecc336a1f109ac2084558a1a46e0b98bf6ebde333d59d4348a38564363e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 364 43d11ecc336a1f109ac2084558a1a46e0b98bf6ebde333d59d4348a38564363e.exe 364 43d11ecc336a1f109ac2084558a1a46e0b98bf6ebde333d59d4348a38564363e.exe 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3196 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 364 43d11ecc336a1f109ac2084558a1a46e0b98bf6ebde333d59d4348a38564363e.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 3196 Process not Found Token: SeCreatePagefilePrivilege 3196 Process not Found Token: SeShutdownPrivilege 3196 Process not Found Token: SeCreatePagefilePrivilege 3196 Process not Found Token: SeShutdownPrivilege 3196 Process not Found Token: SeCreatePagefilePrivilege 3196 Process not Found Token: SeShutdownPrivilege 3196 Process not Found Token: SeCreatePagefilePrivilege 3196 Process not Found Token: SeShutdownPrivilege 3196 Process not Found Token: SeCreatePagefilePrivilege 3196 Process not Found Token: SeShutdownPrivilege 3196 Process not Found Token: SeCreatePagefilePrivilege 3196 Process not Found -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\43d11ecc336a1f109ac2084558a1a46e0b98bf6ebde333d59d4348a38564363e.exe"C:\Users\Admin\AppData\Local\Temp\43d11ecc336a1f109ac2084558a1a46e0b98bf6ebde333d59d4348a38564363e.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:364