General
-
Target
cc0e75b4f2894bd3b00e3dc29239f33b4b30b36df421f6ef4c2fea1472c7c41f.exe
-
Size
303KB
-
Sample
240111-y32f8sgef7
-
MD5
77f08e8e008915ff37e94539c0364632
-
SHA1
7c3af8d7a9f467c61d834a2559327226d0317589
-
SHA256
cc0e75b4f2894bd3b00e3dc29239f33b4b30b36df421f6ef4c2fea1472c7c41f
-
SHA512
7ab40f12a114ffb9e21078917d5f0074650d5121734efad98fd0122f544e3c9be96f4c36766d7d5616f08853aec6d6e2f2f6d7294aa76ab22dda9157f9dc44bf
-
SSDEEP
3072:WzME0LornOmwseIlLz2y+Hw0H6i5Q3o5Zc3i+Fwj0:U+Lo9wPAp6H66c3i3
Static task
static1
Behavioral task
behavioral1
Sample
cc0e75b4f2894bd3b00e3dc29239f33b4b30b36df421f6ef4c2fea1472c7c41f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cc0e75b4f2894bd3b00e3dc29239f33b4b30b36df421f6ef4c2fea1472c7c41f.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Targets
-
-
Target
cc0e75b4f2894bd3b00e3dc29239f33b4b30b36df421f6ef4c2fea1472c7c41f.exe
-
Size
303KB
-
MD5
77f08e8e008915ff37e94539c0364632
-
SHA1
7c3af8d7a9f467c61d834a2559327226d0317589
-
SHA256
cc0e75b4f2894bd3b00e3dc29239f33b4b30b36df421f6ef4c2fea1472c7c41f
-
SHA512
7ab40f12a114ffb9e21078917d5f0074650d5121734efad98fd0122f544e3c9be96f4c36766d7d5616f08853aec6d6e2f2f6d7294aa76ab22dda9157f9dc44bf
-
SSDEEP
3072:WzME0LornOmwseIlLz2y+Hw0H6i5Q3o5Zc3i+Fwj0:U+Lo9wPAp6H66c3i3
-
Modifies firewall policy service
-
Modifies security service
-
Disables taskbar notifications via registry modification
-
Disables use of System Restore points
-
Sets file execution options in registry
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Drops desktop.ini file(s)
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1