Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-10-2023 00:49
Static task
static1
Behavioral task
behavioral1
Sample
0a2ca1e480d8b227b59575d9d43fc8c4d5e959545f6d5bcce1a4c58e2af5ec57_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0a2ca1e480d8b227b59575d9d43fc8c4d5e959545f6d5bcce1a4c58e2af5ec57_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
0a2ca1e480d8b227b59575d9d43fc8c4d5e959545f6d5bcce1a4c58e2af5ec57_JC.exe
-
Size
299KB
-
MD5
f3a38df2d654578b8ce254c3635759a9
-
SHA1
e9ea9b90046be6cfd68b4e5a2203a4dc0349d987
-
SHA256
0a2ca1e480d8b227b59575d9d43fc8c4d5e959545f6d5bcce1a4c58e2af5ec57
-
SHA512
c0e88e193abed1d2e1de8c5b732f3a1061151f2dfc0e1829b0eac6e62213ab55f0b086140dbf32abf236b24c68e29209293d83872a32142459eb4c63d058701f
-
SSDEEP
3072:Yv28/8eJUoW/9QVtf1jHlBGJdYStBQTc2BQ/FPmhiO8J:YPUJoW/9QVtNhBQd1CxQtPM
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1428 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0a2ca1e480d8b227b59575d9d43fc8c4d5e959545f6d5bcce1a4c58e2af5ec57_JC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0a2ca1e480d8b227b59575d9d43fc8c4d5e959545f6d5bcce1a4c58e2af5ec57_JC.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0a2ca1e480d8b227b59575d9d43fc8c4d5e959545f6d5bcce1a4c58e2af5ec57_JC.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2016 0a2ca1e480d8b227b59575d9d43fc8c4d5e959545f6d5bcce1a4c58e2af5ec57_JC.exe 2016 0a2ca1e480d8b227b59575d9d43fc8c4d5e959545f6d5bcce1a4c58e2af5ec57_JC.exe 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found 1428 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1428 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2016 0a2ca1e480d8b227b59575d9d43fc8c4d5e959545f6d5bcce1a4c58e2af5ec57_JC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a2ca1e480d8b227b59575d9d43fc8c4d5e959545f6d5bcce1a4c58e2af5ec57_JC.exe"C:\Users\Admin\AppData\Local\Temp\0a2ca1e480d8b227b59575d9d43fc8c4d5e959545f6d5bcce1a4c58e2af5ec57_JC.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2016