Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18-02-2024 01:36
Static task
static1
Behavioral task
behavioral1
Sample
c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exe
Resource
win10v2004-20231222-en
General
-
Target
c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exe
-
Size
211KB
-
MD5
28c17350f0da6941f68bbea0eb5af380
-
SHA1
42d3ea0b53b6f76b729a9cef45341fae29933d88
-
SHA256
c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b
-
SHA512
b1bd4d2d1787575b7d5155926aa248203b317f33e13eb237ecb1d33353c3146e6ed67da239f0e96ff98adf8aa7309e6f37f666107176bb6461621d7287fb750f
-
SSDEEP
3072:BIVw4zCuQGezasu4/2z6EuQ/yu0ZsBMRpSQDB8mm3CmO:BIm4GudBsukQ5o8NR
Malware Config
Extracted
smokeloader
pub3
Extracted
smokeloader
2022
http://sjyey.com/tmp/index.php
http://babonwo.ru/tmp/index.php
http://mth.com.ua/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1200 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exepid process 2212 c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exe 2212 c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exe 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exepid process 2212 c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exe"C:\Users\Admin\AppData\Local\Temp\c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2212