Analysis

  • max time kernel
    148s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2024, 05:36

General

  • Target

    9f5a98f982f89f7668905f4a26355978.exe

  • Size

    234KB

  • MD5

    9f5a98f982f89f7668905f4a26355978

  • SHA1

    06950b88bb2f45e75125cad01c674bb0d9291b19

  • SHA256

    c386f2ddb7e75ae37a9ac8908a3cd4606164001901642b48b705ed0f7197470e

  • SHA512

    0de7e5d19d38c6cefe4fcccc7b887e1ebb074bbbb41f1f69c768d23de969bbb87b8ec792b499ee196677b1d453a805572b1cafc6a224f43e0d0b904166e57722

  • SSDEEP

    3072:XRSrpGanOMAuJi4k1KjHPOv465nd2r+rvHYICl3ER/8A:XReRAXXd7Us8

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://gxutc2c.com/tmp/index.php

http://proekt8.ru/tmp/index.php

http://mth.com.ua/tmp/index.php

http://pirateking.online/tmp/index.php

http://piratia.pw/tmp/index.php

http://go-piratia.ru/tmp/index.php

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Deletes itself 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f5a98f982f89f7668905f4a26355978.exe
    "C:\Users\Admin\AppData\Local\Temp\9f5a98f982f89f7668905f4a26355978.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    24aafe47a2c1be860b228b4ca94befa3

    SHA1

    e3e35adf6aacefebede7bd17228922cfbf31cf48

    SHA256

    2fe609b95346ec1c03354310c8271d45cf5525459b5a4396ba01895dcf6600f3

    SHA512

    9dd340c4e3a022f3384284b14965d22de157361e2f24ae54b866579a6613e7bea9a3f122e87b7ea9250ec770e721882191e93481b7a7150e2ba608c6618b72d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    35b39921aa16d5a37b6a7c9cb4a935c0

    SHA1

    296b6d67fc306c2e7ee9fb8858d2846ec64dd657

    SHA256

    4922512cd891077324da37c9e1311f09d65e6ae687892aedc4ecf7a56fd3b682

    SHA512

    a0e6c113459b7ddd4f1e7f48560a87d5c7ebc8c52524f8755de709b3ce6d0c5aead7127a21c9aab4ccc24721f2033193646452b8d65b3ea1532ee57c1089be92

  • C:\Users\Admin\AppData\Local\Temp\Tar81C2.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/1284-4-0x0000000002E10000-0x0000000002E26000-memory.dmp

    Filesize

    88KB

  • memory/1704-3-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1704-2-0x0000000000220000-0x000000000022B000-memory.dmp

    Filesize

    44KB

  • memory/1704-1-0x0000000000590000-0x0000000000690000-memory.dmp

    Filesize

    1024KB

  • memory/1704-5-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB