Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 13:58
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231023-en
General
-
Target
file.exe
-
Size
200KB
-
MD5
4e431ada50287a4075f509904fa12421
-
SHA1
2a22597624ff473f9d7d08625421052874540091
-
SHA256
a6189864b80a674de976bc67a13f42fc6e601f2ea11c446047c84e2d12e120ae
-
SHA512
3eebc9a749e403476a4ecedcc90bb4b53b765aa5a2fddc4a2665aa125cee0a1e92833ce2e8b716fbd0d8c6b547558b626d9bbe98246ec16711acb7da7bf019fb
-
SSDEEP
3072:gqz5yp10w2iXcmO8ODUIRhjBVmju/7kfYj86RR0KhMm71gIc:Sp+bCclfDffN7HgAR0KhMc
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://dpav.cc/tmp/
http://lrproduct.ru/tmp/
http://kggcp.com/tmp/
http://talesofpirates.net/tmp/
http://pirateking.online/tmp/
http://piratia.pw/tmp/
http://go-piratia.ru/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3252 Process not Found -
Executes dropped EXE 1 IoCs
pid Process 3468 dujdgvu -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dujdgvu Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dujdgvu Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dujdgvu Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3268 file.exe 3268 file.exe 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found 3252 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3252 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3268 file.exe 3468 dujdgvu -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3252 Process not Found -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3268
-
C:\Users\Admin\AppData\Roaming\dujdgvuC:\Users\Admin\AppData\Roaming\dujdgvu1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD54e431ada50287a4075f509904fa12421
SHA12a22597624ff473f9d7d08625421052874540091
SHA256a6189864b80a674de976bc67a13f42fc6e601f2ea11c446047c84e2d12e120ae
SHA5123eebc9a749e403476a4ecedcc90bb4b53b765aa5a2fddc4a2665aa125cee0a1e92833ce2e8b716fbd0d8c6b547558b626d9bbe98246ec16711acb7da7bf019fb
-
Filesize
200KB
MD54e431ada50287a4075f509904fa12421
SHA12a22597624ff473f9d7d08625421052874540091
SHA256a6189864b80a674de976bc67a13f42fc6e601f2ea11c446047c84e2d12e120ae
SHA5123eebc9a749e403476a4ecedcc90bb4b53b765aa5a2fddc4a2665aa125cee0a1e92833ce2e8b716fbd0d8c6b547558b626d9bbe98246ec16711acb7da7bf019fb