Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 12:51
Static task
static1
Behavioral task
behavioral1
Sample
36c83eaa04bae1886caa3c4e82ef02fa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36c83eaa04bae1886caa3c4e82ef02fa.exe
Resource
win10v2004-20231215-en
General
-
Target
36c83eaa04bae1886caa3c4e82ef02fa.exe
-
Size
207KB
-
MD5
36c83eaa04bae1886caa3c4e82ef02fa
-
SHA1
36d5917bde801c4134b0c2005db1e647bd4a1685
-
SHA256
d652eff7f077c104b6fc042cba3a82f02c7842ab4d1051cfd8a972fa44521d51
-
SHA512
971fad28c56933c42ae3115dcb66b8afed6b6d3ce00543b3378645675a88be0c7606675b8038511387362949d2cdb604b9821babb40c833f40b85f6328c7f75c
-
SSDEEP
3072:pDAqtUwgZ84/Nca503AJT5mBrReX6qqOFjTwa/N/zxJWtk0K:aKD4/WaONBrRgpfjTwa/RxJg
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1276 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 36c83eaa04bae1886caa3c4e82ef02fa.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 36c83eaa04bae1886caa3c4e82ef02fa.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 36c83eaa04bae1886caa3c4e82ef02fa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1948 36c83eaa04bae1886caa3c4e82ef02fa.exe 1948 36c83eaa04bae1886caa3c4e82ef02fa.exe 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1948 36c83eaa04bae1886caa3c4e82ef02fa.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1276 Process not Found 1276 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1276 Process not Found 1276 Process not Found