Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 11:27
Static task
static1
Behavioral task
behavioral1
Sample
983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c.exe
Resource
win10v2004-20230915-en
General
-
Target
983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c.exe
-
Size
266KB
-
MD5
28d76bc20e00e083b7b1846e0e242ba4
-
SHA1
f0256c658fc8a72adc2b4f13b6268603479098e3
-
SHA256
983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c
-
SHA512
dbcd5148437958d23171bc815776f5501509b6b24d7d081d44a536b9772de3780e1fd71f4f329d7e4ccc983204a44d8dc71d66ee1d9cd1ba51578a03189a5a23
-
SSDEEP
3072:y0XZRrpPgrVGUyt+2GlNedZTMOSi1AeWG+BZ3V7OX9BocL45mUspX:vTrWrEUy0Z7dOBAeN+p7nS45mUs
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1412 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2824 983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c.exe 2824 983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c.exe 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1412 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2824 983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c.exe"C:\Users\Admin\AppData\Local\Temp\983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2824