Analysis
-
max time kernel
152s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
15/11/2023, 21:46
Static task
static1
Behavioral task
behavioral1
Sample
a28a27b6c23e122e4523364f7328ed2c.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
a28a27b6c23e122e4523364f7328ed2c.exe
Resource
win10v2004-20231023-en
General
-
Target
a28a27b6c23e122e4523364f7328ed2c.exe
-
Size
249KB
-
MD5
a28a27b6c23e122e4523364f7328ed2c
-
SHA1
fab7abf1d8a28c24660000e429ffc5bf269d3205
-
SHA256
ba87c237b03a3a5a54273ccded35d16559f33678a76f05ce856389e207b68046
-
SHA512
4ce5a24f40858caf1fe904f6603cf5aa525d1b5a632b1e3f5eec616a52d7e5db8f0048034c1d00965c7bf1c7fca98c0a55a18706182e4a7fc5681f6088d12f5c
-
SSDEEP
3072:A7RpLqsnBHKmo+0kWE23iyofv7XcMY5YMJvROUQEeck9CR:i7LqsBqmoEvZyeser2e
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://dpav.cc/tmp/
http://lrproduct.ru/tmp/
http://kggcp.com/tmp/
http://talesofpirates.net/tmp/
http://pirateking.online/tmp/
http://piratia.pw/tmp/
http://go-piratia.ru/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1264 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a28a27b6c23e122e4523364f7328ed2c.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a28a27b6c23e122e4523364f7328ed2c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a28a27b6c23e122e4523364f7328ed2c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2656 a28a27b6c23e122e4523364f7328ed2c.exe 2656 a28a27b6c23e122e4523364f7328ed2c.exe 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1264 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2656 a28a27b6c23e122e4523364f7328ed2c.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1264 Process not Found 1264 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1264 Process not Found 1264 Process not Found -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.