Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 20:52
Static task
static1
Behavioral task
behavioral1
Sample
0e9cd3a18f2ca5e439da58da9d4dc112b84728135447794ee0e32c0c84ba309d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0e9cd3a18f2ca5e439da58da9d4dc112b84728135447794ee0e32c0c84ba309d.exe
Resource
win10v2004-20230915-en
General
-
Target
0e9cd3a18f2ca5e439da58da9d4dc112b84728135447794ee0e32c0c84ba309d.exe
-
Size
311KB
-
MD5
f761fb543feb14ec08a504bca0bfbab9
-
SHA1
fbee8b147162cf5bf88a7ddb25620867e7941a64
-
SHA256
0e9cd3a18f2ca5e439da58da9d4dc112b84728135447794ee0e32c0c84ba309d
-
SHA512
5deaf4126f60aaab284bdf12a5095dc0a591ba01ee2a054e7aef3e512cccb9514c55f07d1f7afcb5b7082a0976e30ffd836ec386a68d0e09a2547b53819221c8
-
SSDEEP
6144:vPDklTtka3q1Q1dRSW2EEiQvtOCVFkd+L6+Wy:HETKaqaZt/E/tOCnte+7
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://gudintas.at/tmp/
http://pik96.ru/tmp/
http://rosatiauto.com/tmp/
http://kingpirate.ru/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1268 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0e9cd3a18f2ca5e439da58da9d4dc112b84728135447794ee0e32c0c84ba309d.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0e9cd3a18f2ca5e439da58da9d4dc112b84728135447794ee0e32c0c84ba309d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0e9cd3a18f2ca5e439da58da9d4dc112b84728135447794ee0e32c0c84ba309d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1396 0e9cd3a18f2ca5e439da58da9d4dc112b84728135447794ee0e32c0c84ba309d.exe 1396 0e9cd3a18f2ca5e439da58da9d4dc112b84728135447794ee0e32c0c84ba309d.exe 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1268 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1396 0e9cd3a18f2ca5e439da58da9d4dc112b84728135447794ee0e32c0c84ba309d.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e9cd3a18f2ca5e439da58da9d4dc112b84728135447794ee0e32c0c84ba309d.exe"C:\Users\Admin\AppData\Local\Temp\0e9cd3a18f2ca5e439da58da9d4dc112b84728135447794ee0e32c0c84ba309d.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1396