Analysis
-
max time kernel
156s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2023 14:48
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231023-en
General
-
Target
file.exe
-
Size
200KB
-
MD5
f8d31f3b7fb53ef35edcc483360c5d89
-
SHA1
95581d3aa3f61aee4f929e5e00ee3938426f8d5d
-
SHA256
28a3132ff1dae5dda972e6d3910639c81d51bd593f065998df1e8efac0b64a9e
-
SHA512
685fed074c6430afab3250bdbed5934bb2f073f8fb30d9b073fa48d350276d0826d4d8836a29224de2d1cd4b93a8bdcfccbaf47cafa9fa31582e5fdd3d703334
-
SSDEEP
3072:nCgVq+uwJmgOGnWE+GR81XYfKa2qbfyArQsAZCoXlv:FvugmPG6I8NY7nbfM9n
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://dpav.cc/tmp/
http://lrproduct.ru/tmp/
http://kggcp.com/tmp/
http://talesofpirates.net/tmp/
http://pirateking.online/tmp/
http://piratia.pw/tmp/
http://go-piratia.ru/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3132 Process not Found -
Executes dropped EXE 1 IoCs
pid Process 4168 tftshhr -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tftshhr Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tftshhr Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tftshhr -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3068 file.exe 3068 file.exe 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found 3132 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3132 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3068 file.exe 4168 tftshhr -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3132 Process not Found Token: SeCreatePagefilePrivilege 3132 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3132 Process not Found -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3068
-
C:\Users\Admin\AppData\Roaming\tftshhrC:\Users\Admin\AppData\Roaming\tftshhr1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD5f8d31f3b7fb53ef35edcc483360c5d89
SHA195581d3aa3f61aee4f929e5e00ee3938426f8d5d
SHA25628a3132ff1dae5dda972e6d3910639c81d51bd593f065998df1e8efac0b64a9e
SHA512685fed074c6430afab3250bdbed5934bb2f073f8fb30d9b073fa48d350276d0826d4d8836a29224de2d1cd4b93a8bdcfccbaf47cafa9fa31582e5fdd3d703334
-
Filesize
200KB
MD5f8d31f3b7fb53ef35edcc483360c5d89
SHA195581d3aa3f61aee4f929e5e00ee3938426f8d5d
SHA25628a3132ff1dae5dda972e6d3910639c81d51bd593f065998df1e8efac0b64a9e
SHA512685fed074c6430afab3250bdbed5934bb2f073f8fb30d9b073fa48d350276d0826d4d8836a29224de2d1cd4b93a8bdcfccbaf47cafa9fa31582e5fdd3d703334