Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2023 10:28
Static task
static1
Behavioral task
behavioral1
Sample
a647595e7316d00d459c41191fc8169ce5a3cfa357d5a9651b6f870d6e06f175.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
a647595e7316d00d459c41191fc8169ce5a3cfa357d5a9651b6f870d6e06f175.exe
Resource
win10v2004-20231023-en
General
-
Target
a647595e7316d00d459c41191fc8169ce5a3cfa357d5a9651b6f870d6e06f175.exe
-
Size
289KB
-
MD5
868b8f185038654472a6579b9269df19
-
SHA1
1694bed39163d09ecfef89f2876cd3d2eb7608f9
-
SHA256
a647595e7316d00d459c41191fc8169ce5a3cfa357d5a9651b6f870d6e06f175
-
SHA512
f12ea8054aac24aee0dbfde52e826100c3e70bd70e8fef24b97fc87d55f3bd01de62323034676f3c697ac3254fecfaa6e30698c5bef3aa6e4ec88ce8e0e45a44
-
SSDEEP
3072:DeOMh0OnJpjO/UySoUXw0sIYje/DLKcBeaQ5mUQU8rQj+/:aOc0OJhOcyEs2LK8Hw8t
Malware Config
Extracted
smokeloader
2022
http://onualituyrs.org/
http://sumagulituyo.org/
http://snukerukeutit.org/
http://lightseinsteniki.org/
http://liuliuoumumy.org/
http://stualialuyastrelia.net/
http://kumbuyartyty.net/
http://criogetikfenbut.org/
http://tonimiuyaytre.org/
http://tyiuiunuewqy.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
a647595e7316d00d459c41191fc8169ce5a3cfa357d5a9651b6f870d6e06f175.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a647595e7316d00d459c41191fc8169ce5a3cfa357d5a9651b6f870d6e06f175.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a647595e7316d00d459c41191fc8169ce5a3cfa357d5a9651b6f870d6e06f175.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a647595e7316d00d459c41191fc8169ce5a3cfa357d5a9651b6f870d6e06f175.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
a647595e7316d00d459c41191fc8169ce5a3cfa357d5a9651b6f870d6e06f175.exepid process 1984 a647595e7316d00d459c41191fc8169ce5a3cfa357d5a9651b6f870d6e06f175.exe 1984 a647595e7316d00d459c41191fc8169ce5a3cfa357d5a9651b6f870d6e06f175.exe 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 3312 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
a647595e7316d00d459c41191fc8169ce5a3cfa357d5a9651b6f870d6e06f175.exepid process 1984 a647595e7316d00d459c41191fc8169ce5a3cfa357d5a9651b6f870d6e06f175.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a647595e7316d00d459c41191fc8169ce5a3cfa357d5a9651b6f870d6e06f175.exe"C:\Users\Admin\AppData\Local\Temp\a647595e7316d00d459c41191fc8169ce5a3cfa357d5a9651b6f870d6e06f175.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1984