Analysis
-
max time kernel
168s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 00:00
Static task
static1
Behavioral task
behavioral1
Sample
1b03697e2b8b2408ae694ce59b76a83677b990546d5e3d27732d5dd62347224c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1b03697e2b8b2408ae694ce59b76a83677b990546d5e3d27732d5dd62347224c.exe
Resource
win10v2004-20230915-en
General
-
Target
1b03697e2b8b2408ae694ce59b76a83677b990546d5e3d27732d5dd62347224c.exe
-
Size
212KB
-
MD5
27f5207eb726b8d39f594c28416e2917
-
SHA1
452eb6cc892b3add9e99c976abd082499d24ecf0
-
SHA256
1b03697e2b8b2408ae694ce59b76a83677b990546d5e3d27732d5dd62347224c
-
SHA512
fa5a7509fb90a01b027ed5f36215629a2af077326e84a2a315036b32c2316dc374da25f51c4a44114e485b5c2af627a20c3d7421bc83e0a75f382656cab51470
-
SSDEEP
3072:3XJdNdlNSoDR3pAMrWBCzDzHICQqFzqunHhvb51KOoDtmz:nLNLMyR3iM6CzvIcqunHdKd
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1256 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1b03697e2b8b2408ae694ce59b76a83677b990546d5e3d27732d5dd62347224c.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1b03697e2b8b2408ae694ce59b76a83677b990546d5e3d27732d5dd62347224c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1b03697e2b8b2408ae694ce59b76a83677b990546d5e3d27732d5dd62347224c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2676 1b03697e2b8b2408ae694ce59b76a83677b990546d5e3d27732d5dd62347224c.exe 2676 1b03697e2b8b2408ae694ce59b76a83677b990546d5e3d27732d5dd62347224c.exe 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found 1256 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1256 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2676 1b03697e2b8b2408ae694ce59b76a83677b990546d5e3d27732d5dd62347224c.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b03697e2b8b2408ae694ce59b76a83677b990546d5e3d27732d5dd62347224c.exe"C:\Users\Admin\AppData\Local\Temp\1b03697e2b8b2408ae694ce59b76a83677b990546d5e3d27732d5dd62347224c.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2676