Analysis
-
max time kernel
159s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 11:27
Static task
static1
Behavioral task
behavioral1
Sample
983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c.exe
Resource
win10v2004-20230915-en
General
-
Target
983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c.exe
-
Size
266KB
-
MD5
28d76bc20e00e083b7b1846e0e242ba4
-
SHA1
f0256c658fc8a72adc2b4f13b6268603479098e3
-
SHA256
983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c
-
SHA512
dbcd5148437958d23171bc815776f5501509b6b24d7d081d44a536b9772de3780e1fd71f4f329d7e4ccc983204a44d8dc71d66ee1d9cd1ba51578a03189a5a23
-
SSDEEP
3072:y0XZRrpPgrVGUyt+2GlNedZTMOSi1AeWG+BZ3V7OX9BocL45mUspX:vTrWrEUy0Z7dOBAeN+p7nS45mUs
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 1 IoCs
pid Process 4604 atuddci -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI atuddci Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI atuddci Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI atuddci -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4356 983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c.exe 4356 983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c.exe 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3112 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4356 983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3112 Process not Found Token: SeCreatePagefilePrivilege 3112 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3112 Process not Found -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c.exe"C:\Users\Admin\AppData\Local\Temp\983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4356
-
C:\Users\Admin\AppData\Roaming\atuddciC:\Users\Admin\AppData\Roaming\atuddci1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266KB
MD528d76bc20e00e083b7b1846e0e242ba4
SHA1f0256c658fc8a72adc2b4f13b6268603479098e3
SHA256983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c
SHA512dbcd5148437958d23171bc815776f5501509b6b24d7d081d44a536b9772de3780e1fd71f4f329d7e4ccc983204a44d8dc71d66ee1d9cd1ba51578a03189a5a23
-
Filesize
266KB
MD528d76bc20e00e083b7b1846e0e242ba4
SHA1f0256c658fc8a72adc2b4f13b6268603479098e3
SHA256983eecd93e507fe9b968cad6e83c5314fc61ef881a141b40d0102b6f1fa5be4c
SHA512dbcd5148437958d23171bc815776f5501509b6b24d7d081d44a536b9772de3780e1fd71f4f329d7e4ccc983204a44d8dc71d66ee1d9cd1ba51578a03189a5a23