Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231130-en -
resource tags
arch:x64arch:x86image:win7-20231130-enlocale:en-usos:windows7-x64system -
submitted
12/12/2023, 04:20
Static task
static1
Behavioral task
behavioral1
Sample
27a170af47bcf112a0045a1845d6188d5e8bc5b748eefa11f9f7008c36f72c62.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
27a170af47bcf112a0045a1845d6188d5e8bc5b748eefa11f9f7008c36f72c62.exe
Resource
win10v2004-20231127-en
General
-
Target
27a170af47bcf112a0045a1845d6188d5e8bc5b748eefa11f9f7008c36f72c62.exe
-
Size
190KB
-
MD5
299c7d3aec672b821f03493648e7861e
-
SHA1
ab318886adde48b909fcdda9f79e066bfa386045
-
SHA256
27a170af47bcf112a0045a1845d6188d5e8bc5b748eefa11f9f7008c36f72c62
-
SHA512
c0e8cfb4e6389b119657ad0159c0d7ff083f5e3491b98c9574a9e00c12d70adda340157b05963b5dcb7da53a3cba3d4595b24d74e37c9da293b5b05578314623
-
SSDEEP
3072:BJW9jLf7N+CgU8Y2Wf33P12HRvdvQb7YWtc/kBplt3Rfgs85eq:G9jLzN+Cp133d2x1vw7YmUy
Malware Config
Extracted
smokeloader
2022
http://onualituyrs.org/
http://sumagulituyo.org/
http://snukerukeutit.org/
http://lightseinsteniki.org/
http://liuliuoumumy.org/
http://stualialuyastrelia.net/
http://kumbuyartyty.net/
http://criogetikfenbut.org/
http://tonimiuyaytre.org/
http://tyiuiunuewqy.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1356 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 27a170af47bcf112a0045a1845d6188d5e8bc5b748eefa11f9f7008c36f72c62.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 27a170af47bcf112a0045a1845d6188d5e8bc5b748eefa11f9f7008c36f72c62.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 27a170af47bcf112a0045a1845d6188d5e8bc5b748eefa11f9f7008c36f72c62.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2916 27a170af47bcf112a0045a1845d6188d5e8bc5b748eefa11f9f7008c36f72c62.exe 2916 27a170af47bcf112a0045a1845d6188d5e8bc5b748eefa11f9f7008c36f72c62.exe 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found 1356 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2916 27a170af47bcf112a0045a1845d6188d5e8bc5b748eefa11f9f7008c36f72c62.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\27a170af47bcf112a0045a1845d6188d5e8bc5b748eefa11f9f7008c36f72c62.exe"C:\Users\Admin\AppData\Local\Temp\27a170af47bcf112a0045a1845d6188d5e8bc5b748eefa11f9f7008c36f72c62.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2916