Analysis
-
max time kernel
302s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
05-11-2023 22:21
Static task
static1
Behavioral task
behavioral1
Sample
443e1e5425fa68b2ed3624ff027cb70c47076ba48edb2b51d0a4ff11d69509de.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
443e1e5425fa68b2ed3624ff027cb70c47076ba48edb2b51d0a4ff11d69509de.exe
Resource
win10-20231020-en
General
-
Target
443e1e5425fa68b2ed3624ff027cb70c47076ba48edb2b51d0a4ff11d69509de.exe
-
Size
251KB
-
MD5
007d688a89d9dad8f57dfa8b3b5e27e0
-
SHA1
2f17ec3490e79abbe28da77e6d954c21b786a1c8
-
SHA256
443e1e5425fa68b2ed3624ff027cb70c47076ba48edb2b51d0a4ff11d69509de
-
SHA512
7f12cc8b2eeb63c6fa4218dcd155d7a934317bd13ca3a68db06cfaecc014701540585c11407c251322136ebec84eb8a39ce3b799a2d9d8c3c523fce1baebbfff
-
SSDEEP
3072:5VoP9wuknKQ5pXjjz3+mWmUji+SpDZO2033wr8hme3JUdry/Ocat:LoyuzQ/T3+7mh+S5ZO2O3wIhT2wG
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://dpav.cc/tmp/
http://lrproduct.ru/tmp/
http://kggcp.com/tmp/
http://talesofpirates.net/tmp/
http://pirateking.online/tmp/
http://piratia.pw/tmp/
http://go-piratia.ru/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1380 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 443e1e5425fa68b2ed3624ff027cb70c47076ba48edb2b51d0a4ff11d69509de.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 443e1e5425fa68b2ed3624ff027cb70c47076ba48edb2b51d0a4ff11d69509de.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 443e1e5425fa68b2ed3624ff027cb70c47076ba48edb2b51d0a4ff11d69509de.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2896 443e1e5425fa68b2ed3624ff027cb70c47076ba48edb2b51d0a4ff11d69509de.exe 2896 443e1e5425fa68b2ed3624ff027cb70c47076ba48edb2b51d0a4ff11d69509de.exe 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1380 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2896 443e1e5425fa68b2ed3624ff027cb70c47076ba48edb2b51d0a4ff11d69509de.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1380 Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\443e1e5425fa68b2ed3624ff027cb70c47076ba48edb2b51d0a4ff11d69509de.exe"C:\Users\Admin\AppData\Local\Temp\443e1e5425fa68b2ed3624ff027cb70c47076ba48edb2b51d0a4ff11d69509de.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2896