Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-10-2023 20:24
Static task
static1
Behavioral task
behavioral1
Sample
56b95f7635f6810c7aa7f382e3a0619f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
56b95f7635f6810c7aa7f382e3a0619f.exe
Resource
win10v2004-20230915-en
General
-
Target
56b95f7635f6810c7aa7f382e3a0619f.exe
-
Size
293KB
-
MD5
56b95f7635f6810c7aa7f382e3a0619f
-
SHA1
237ee4e40174ab47526c0a073fb00f9c1d651f32
-
SHA256
8282c76d3fbe900b90d4cc171b116191362effd2ca851d3552742aabbf77ecf9
-
SHA512
9600f7469b39935175b154635a0e68ebfe095f3084bc1579668b28a7cf2a3924cfeaa63426b9fcb090795bd4d9df1048c984a18de76f89895d033be6af244de9
-
SSDEEP
3072:PRNqA9lXnG55hSdoz2hzFvA8rnr3duiVdVD5jTv/KjQZ0:P6snG55hSs2hzVA8pdVVTvMQ
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://wirtshauspost.at/tmp/
http://msktk.ru/tmp/
http://soetegem.com/tmp/
http://gromograd.ru/tmp/
http://talesofpirates.net/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1276 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 56b95f7635f6810c7aa7f382e3a0619f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 56b95f7635f6810c7aa7f382e3a0619f.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 56b95f7635f6810c7aa7f382e3a0619f.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1456 56b95f7635f6810c7aa7f382e3a0619f.exe 1456 56b95f7635f6810c7aa7f382e3a0619f.exe 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1276 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1456 56b95f7635f6810c7aa7f382e3a0619f.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.