Analysis
-
max time kernel
300s -
max time network
269s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
21/11/2023, 04:52
Static task
static1
Behavioral task
behavioral1
Sample
839c39cefe61e0bab9e0da6aaff2ae95aa93b6b8ef947bf712dbc75482f3a4af.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
839c39cefe61e0bab9e0da6aaff2ae95aa93b6b8ef947bf712dbc75482f3a4af.exe
Resource
win10-20231020-en
General
-
Target
839c39cefe61e0bab9e0da6aaff2ae95aa93b6b8ef947bf712dbc75482f3a4af.exe
-
Size
267KB
-
MD5
06bb71ad00cf3ed6f68ee0ff285fe351
-
SHA1
20b3c8284ca758aef413829264986fb3d4c78ff0
-
SHA256
839c39cefe61e0bab9e0da6aaff2ae95aa93b6b8ef947bf712dbc75482f3a4af
-
SHA512
52ef8028e3841a63fb6278b6f7f71210582158d9eb026dbfad927e7e1ca8e8232ca57ad1d9e2efafd43590ef683f28d054bfd960f8385382f50924d0df77709c
-
SSDEEP
3072:tsXZ4khPcCMW+HB03IRvnasB4wKOY7lDdRFxahRWEVm7ovbeB4:MVBWWd4taG4wYlxRFxvEVmM
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://dpav.cc/tmp/
http://lrproduct.ru/tmp/
http://kggcp.com/tmp/
http://talesofpirates.net/tmp/
http://pirateking.online/tmp/
http://piratia.pw/tmp/
http://go-piratia.ru/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3320 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 839c39cefe61e0bab9e0da6aaff2ae95aa93b6b8ef947bf712dbc75482f3a4af.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 839c39cefe61e0bab9e0da6aaff2ae95aa93b6b8ef947bf712dbc75482f3a4af.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 839c39cefe61e0bab9e0da6aaff2ae95aa93b6b8ef947bf712dbc75482f3a4af.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4940 839c39cefe61e0bab9e0da6aaff2ae95aa93b6b8ef947bf712dbc75482f3a4af.exe 4940 839c39cefe61e0bab9e0da6aaff2ae95aa93b6b8ef947bf712dbc75482f3a4af.exe 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found 3320 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3320 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4940 839c39cefe61e0bab9e0da6aaff2ae95aa93b6b8ef947bf712dbc75482f3a4af.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 3320 Process not Found Token: SeCreatePagefilePrivilege 3320 Process not Found Token: SeShutdownPrivilege 3320 Process not Found Token: SeCreatePagefilePrivilege 3320 Process not Found Token: SeShutdownPrivilege 3320 Process not Found Token: SeCreatePagefilePrivilege 3320 Process not Found Token: SeShutdownPrivilege 3320 Process not Found Token: SeCreatePagefilePrivilege 3320 Process not Found Token: SeShutdownPrivilege 3320 Process not Found Token: SeCreatePagefilePrivilege 3320 Process not Found Token: SeShutdownPrivilege 3320 Process not Found Token: SeCreatePagefilePrivilege 3320 Process not Found Token: SeShutdownPrivilege 3320 Process not Found Token: SeCreatePagefilePrivilege 3320 Process not Found Token: SeShutdownPrivilege 3320 Process not Found Token: SeCreatePagefilePrivilege 3320 Process not Found Token: SeShutdownPrivilege 3320 Process not Found Token: SeCreatePagefilePrivilege 3320 Process not Found Token: SeShutdownPrivilege 3320 Process not Found Token: SeCreatePagefilePrivilege 3320 Process not Found Token: SeShutdownPrivilege 3320 Process not Found Token: SeCreatePagefilePrivilege 3320 Process not Found -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\839c39cefe61e0bab9e0da6aaff2ae95aa93b6b8ef947bf712dbc75482f3a4af.exe"C:\Users\Admin\AppData\Local\Temp\839c39cefe61e0bab9e0da6aaff2ae95aa93b6b8ef947bf712dbc75482f3a4af.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4940