Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
26-11-2023 13:30
Static task
static1
Behavioral task
behavioral1
Sample
4d80f93923e0ff63d3dab7126446f4b33924d1306ae7524dacf36470689fdc28.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
4d80f93923e0ff63d3dab7126446f4b33924d1306ae7524dacf36470689fdc28.exe
Resource
win10v2004-20231025-en
General
-
Target
4d80f93923e0ff63d3dab7126446f4b33924d1306ae7524dacf36470689fdc28.exe
-
Size
311KB
-
MD5
9bc6f31bfa435bb9341f17fe92124494
-
SHA1
2faf41c2376076c67d2aea5b0ecf536f818e802a
-
SHA256
4d80f93923e0ff63d3dab7126446f4b33924d1306ae7524dacf36470689fdc28
-
SHA512
8a6adcda1fcb3bdcc212ef0867fd78b235f3fbbf4f5a852ba57f59156875891301706610f3c5cc01ee3950ecbe96b90154d580569fd2029d466c9306da0bc9c8
-
SSDEEP
3072:FScc5DlAi2rr34I3tHb6PXNsHssn4VI52p7EGf5XyBk3eFx/RIAB:RcrASS76lsHssEJc5
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://dpav.cc/tmp/
http://lrproduct.ru/tmp/
http://kggcp.com/tmp/
http://talesofpirates.net/tmp/
http://pirateking.online/tmp/
http://piratia.pw/tmp/
http://go-piratia.ru/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1260 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4d80f93923e0ff63d3dab7126446f4b33924d1306ae7524dacf36470689fdc28.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4d80f93923e0ff63d3dab7126446f4b33924d1306ae7524dacf36470689fdc28.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4d80f93923e0ff63d3dab7126446f4b33924d1306ae7524dacf36470689fdc28.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1720 4d80f93923e0ff63d3dab7126446f4b33924d1306ae7524dacf36470689fdc28.exe 1720 4d80f93923e0ff63d3dab7126446f4b33924d1306ae7524dacf36470689fdc28.exe 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1260 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1720 4d80f93923e0ff63d3dab7126446f4b33924d1306ae7524dacf36470689fdc28.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d80f93923e0ff63d3dab7126446f4b33924d1306ae7524dacf36470689fdc28.exe"C:\Users\Admin\AppData\Local\Temp\4d80f93923e0ff63d3dab7126446f4b33924d1306ae7524dacf36470689fdc28.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1720