Analysis
-
max time kernel
159s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 22:44
Static task
static1
Behavioral task
behavioral1
Sample
2e98503c281cc75d3ca1c1b8f7001c94994c288e84057cfaf3a47480dcebcae9_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2e98503c281cc75d3ca1c1b8f7001c94994c288e84057cfaf3a47480dcebcae9_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2e98503c281cc75d3ca1c1b8f7001c94994c288e84057cfaf3a47480dcebcae9_JC.exe
-
Size
321KB
-
MD5
6b55f9cddd1103520f8be63382a8c2b3
-
SHA1
ad860b13484d9c5872eb9dfe4b732e497312ab13
-
SHA256
2e98503c281cc75d3ca1c1b8f7001c94994c288e84057cfaf3a47480dcebcae9
-
SHA512
2dd175aeed051939f06859e6ed5ba4d72646c98b1da03691ae9949ca4d9f12bbed408363f986bcd898fe5532ab84903b0fa08d6c6eb2f8ff2646714c68577638
-
SSDEEP
3072:oOQzaqhiX2kbMENY9Z7fu6JjL9lwJ36C8tzx7YVSsgfQLcrtJ4B:NQz3hm2kbMkY+of2q9tzNYVSfC
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2e98503c281cc75d3ca1c1b8f7001c94994c288e84057cfaf3a47480dcebcae9_JC.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2e98503c281cc75d3ca1c1b8f7001c94994c288e84057cfaf3a47480dcebcae9_JC.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2e98503c281cc75d3ca1c1b8f7001c94994c288e84057cfaf3a47480dcebcae9_JC.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 664 2e98503c281cc75d3ca1c1b8f7001c94994c288e84057cfaf3a47480dcebcae9_JC.exe 664 2e98503c281cc75d3ca1c1b8f7001c94994c288e84057cfaf3a47480dcebcae9_JC.exe 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2556 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 664 2e98503c281cc75d3ca1c1b8f7001c94994c288e84057cfaf3a47480dcebcae9_JC.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 2556 Process not Found Token: SeCreatePagefilePrivilege 2556 Process not Found Token: SeShutdownPrivilege 2556 Process not Found Token: SeCreatePagefilePrivilege 2556 Process not Found Token: SeShutdownPrivilege 2556 Process not Found Token: SeCreatePagefilePrivilege 2556 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2556 Process not Found -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e98503c281cc75d3ca1c1b8f7001c94994c288e84057cfaf3a47480dcebcae9_JC.exe"C:\Users\Admin\AppData\Local\Temp\2e98503c281cc75d3ca1c1b8f7001c94994c288e84057cfaf3a47480dcebcae9_JC.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:664