Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 06:32
Static task
static1
Behavioral task
behavioral1
Sample
e0eab32a2b5fd560564be55939fd0a8130f8ad488af47041768e8433972c1ce2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
e0eab32a2b5fd560564be55939fd0a8130f8ad488af47041768e8433972c1ce2.exe
Resource
win10v2004-20231222-en
General
-
Target
e0eab32a2b5fd560564be55939fd0a8130f8ad488af47041768e8433972c1ce2.exe
-
Size
238KB
-
MD5
77552cb72898c0749237077252bd298e
-
SHA1
388a8d65a3d21f6b3bdbf79e6e1635e3fd8d3ca5
-
SHA256
e0eab32a2b5fd560564be55939fd0a8130f8ad488af47041768e8433972c1ce2
-
SHA512
52c56129f1c535ca5fb7f37283b8baba3937c3e1828341a8056c4c61a306d342c00e6e135aa77d17988d3c8cb9156ab8dd2839e2c73eae5446455c97186ccc14
-
SSDEEP
3072:1t6S+BisPLWLiulod7f7RF78F9t6uQYdj598inIuG9H:qLMirxDRF7TuQe8inR
Malware Config
Extracted
smokeloader
2022
http://kitfishstore.ru/index.php
http://homemademagazine.ru/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1272 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e0eab32a2b5fd560564be55939fd0a8130f8ad488af47041768e8433972c1ce2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e0eab32a2b5fd560564be55939fd0a8130f8ad488af47041768e8433972c1ce2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e0eab32a2b5fd560564be55939fd0a8130f8ad488af47041768e8433972c1ce2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3004 e0eab32a2b5fd560564be55939fd0a8130f8ad488af47041768e8433972c1ce2.exe 3004 e0eab32a2b5fd560564be55939fd0a8130f8ad488af47041768e8433972c1ce2.exe 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3004 e0eab32a2b5fd560564be55939fd0a8130f8ad488af47041768e8433972c1ce2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0eab32a2b5fd560564be55939fd0a8130f8ad488af47041768e8433972c1ce2.exe"C:\Users\Admin\AppData\Local\Temp\e0eab32a2b5fd560564be55939fd0a8130f8ad488af47041768e8433972c1ce2.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3004