Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2023 10:24
Static task
static1
Behavioral task
behavioral1
Sample
190a3b8cb53cc76a04666d9453d30527902b0ea67d56d6462d9732b91768d106.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
190a3b8cb53cc76a04666d9453d30527902b0ea67d56d6462d9732b91768d106.exe
Resource
win10v2004-20231023-en
General
-
Target
190a3b8cb53cc76a04666d9453d30527902b0ea67d56d6462d9732b91768d106.exe
-
Size
288KB
-
MD5
8df50cf52274c76c80901ea6f29ac7f3
-
SHA1
d95b8221dd9054f36775237f164bfd16bf4a4467
-
SHA256
190a3b8cb53cc76a04666d9453d30527902b0ea67d56d6462d9732b91768d106
-
SHA512
527d7c93658fa10a01a8f012ce2f6a83c29509367d14ff4e5fa2b87f41cc3663dac5c2b5ff93a3511ab0fb59e7355364b4589fa4933a860400ad7ec1fd6e32e9
-
SSDEEP
3072:usxu5M2SGMFJz+M9E251tCyCa4N1xfepQ5mgYXDR5kVyBk3eFx/RiPB:Po5DMzzZ/nCagfex5XD9+
Malware Config
Extracted
smokeloader
2022
http://onualituyrs.org/
http://sumagulituyo.org/
http://snukerukeutit.org/
http://lightseinsteniki.org/
http://liuliuoumumy.org/
http://stualialuyastrelia.net/
http://kumbuyartyty.net/
http://criogetikfenbut.org/
http://tonimiuyaytre.org/
http://tyiuiunuewqy.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
190a3b8cb53cc76a04666d9453d30527902b0ea67d56d6462d9732b91768d106.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 190a3b8cb53cc76a04666d9453d30527902b0ea67d56d6462d9732b91768d106.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 190a3b8cb53cc76a04666d9453d30527902b0ea67d56d6462d9732b91768d106.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 190a3b8cb53cc76a04666d9453d30527902b0ea67d56d6462d9732b91768d106.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
190a3b8cb53cc76a04666d9453d30527902b0ea67d56d6462d9732b91768d106.exepid process 5076 190a3b8cb53cc76a04666d9453d30527902b0ea67d56d6462d9732b91768d106.exe 5076 190a3b8cb53cc76a04666d9453d30527902b0ea67d56d6462d9732b91768d106.exe 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 3288 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
190a3b8cb53cc76a04666d9453d30527902b0ea67d56d6462d9732b91768d106.exepid process 5076 190a3b8cb53cc76a04666d9453d30527902b0ea67d56d6462d9732b91768d106.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\190a3b8cb53cc76a04666d9453d30527902b0ea67d56d6462d9732b91768d106.exe"C:\Users\Admin\AppData\Local\Temp\190a3b8cb53cc76a04666d9453d30527902b0ea67d56d6462d9732b91768d106.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5076