Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 13:52
Static task
static1
Behavioral task
behavioral1
Sample
b663fcdcbba9366d129d32c6282ff26c55eaf456bccee93304bb831d713d6bf2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b663fcdcbba9366d129d32c6282ff26c55eaf456bccee93304bb831d713d6bf2.exe
Resource
win10v2004-20230915-en
General
-
Target
b663fcdcbba9366d129d32c6282ff26c55eaf456bccee93304bb831d713d6bf2.exe
-
Size
222KB
-
MD5
cb4ef46a3a78a5afb02a2de7249200ee
-
SHA1
a3d9fa68f9dcfd4b7efbba7a117f7a6f520b930c
-
SHA256
b663fcdcbba9366d129d32c6282ff26c55eaf456bccee93304bb831d713d6bf2
-
SHA512
89268f91f3d72b1ba24353a8396498c3b2d3eca39fe53d566b4c2d93672086dc93f1664e70db8ca6ee029243e1b0e22f1cea8eb65623de8315d3e30ac3b62ab0
-
SSDEEP
6144:44okLs4xtBnKciXmsTu74eVNwfHC7aWjT:441w4xnn5iXnu74ejwfJW3
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://gudintas.at/tmp/
http://pik96.ru/tmp/
http://rosatiauto.com/tmp/
http://kingpirate.ru/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b663fcdcbba9366d129d32c6282ff26c55eaf456bccee93304bb831d713d6bf2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b663fcdcbba9366d129d32c6282ff26c55eaf456bccee93304bb831d713d6bf2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b663fcdcbba9366d129d32c6282ff26c55eaf456bccee93304bb831d713d6bf2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 400 b663fcdcbba9366d129d32c6282ff26c55eaf456bccee93304bb831d713d6bf2.exe 400 b663fcdcbba9366d129d32c6282ff26c55eaf456bccee93304bb831d713d6bf2.exe 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found 2632 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2632 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 400 b663fcdcbba9366d129d32c6282ff26c55eaf456bccee93304bb831d713d6bf2.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2632 Process not Found Token: SeCreatePagefilePrivilege 2632 Process not Found Token: SeShutdownPrivilege 2632 Process not Found Token: SeCreatePagefilePrivilege 2632 Process not Found Token: SeShutdownPrivilege 2632 Process not Found Token: SeCreatePagefilePrivilege 2632 Process not Found Token: SeShutdownPrivilege 2632 Process not Found Token: SeCreatePagefilePrivilege 2632 Process not Found Token: SeShutdownPrivilege 2632 Process not Found Token: SeCreatePagefilePrivilege 2632 Process not Found Token: SeShutdownPrivilege 2632 Process not Found Token: SeCreatePagefilePrivilege 2632 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2632 Process not Found -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b663fcdcbba9366d129d32c6282ff26c55eaf456bccee93304bb831d713d6bf2.exe"C:\Users\Admin\AppData\Local\Temp\b663fcdcbba9366d129d32c6282ff26c55eaf456bccee93304bb831d713d6bf2.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:400