Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2023, 20:38
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
277KB
-
MD5
29292ee21ccf3b6b263667b21ac48f25
-
SHA1
2b195cad837c82ebaeb3f102a9ecbe3d2bb33802
-
SHA256
554543925d158b12b6034fc16203122545d01d345a709f1bfded57a79ec2cb3b
-
SHA512
2dbe2898d331aa6f2c944b348a2d7659281a6d832abe14f8c7dd2f5b8c3cf4c7335a8cd2e84e8581da86a9584a330339c713aadd2361706bcc9a8ad615c080a2
-
SSDEEP
3072:xB0grRoyx4h8fqfhrYppozvuT/emqYHQb6KvQYVeQYF/aT:xNr7xg8WhrYppOWT9qYHQb6KhFY
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://gudintas.at/tmp/
http://pik96.ru/tmp/
http://rosatiauto.com/tmp/
http://kingpirate.ru/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 1 IoCs
pid Process 3748 htfwhwj -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI htfwhwj Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI htfwhwj Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI htfwhwj -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1328 file.exe 1328 file.exe 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found 2624 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2624 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1328 file.exe 3748 htfwhwj -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2624 Process not Found -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1328
-
C:\Users\Admin\AppData\Roaming\htfwhwjC:\Users\Admin\AppData\Roaming\htfwhwj1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277KB
MD529292ee21ccf3b6b263667b21ac48f25
SHA12b195cad837c82ebaeb3f102a9ecbe3d2bb33802
SHA256554543925d158b12b6034fc16203122545d01d345a709f1bfded57a79ec2cb3b
SHA5122dbe2898d331aa6f2c944b348a2d7659281a6d832abe14f8c7dd2f5b8c3cf4c7335a8cd2e84e8581da86a9584a330339c713aadd2361706bcc9a8ad615c080a2
-
Filesize
277KB
MD529292ee21ccf3b6b263667b21ac48f25
SHA12b195cad837c82ebaeb3f102a9ecbe3d2bb33802
SHA256554543925d158b12b6034fc16203122545d01d345a709f1bfded57a79ec2cb3b
SHA5122dbe2898d331aa6f2c944b348a2d7659281a6d832abe14f8c7dd2f5b8c3cf4c7335a8cd2e84e8581da86a9584a330339c713aadd2361706bcc9a8ad615c080a2