Analysis Overview
SHA256
18d4c4325fa3930646e04f03a812ccc0c3b8907297db98317bde5a77fed7ea08
Threat Level: Known bad
The file 18d4c4325fa3930646e04f03a812ccc0c3b8907297db98317bde5a77fed7ea08 was found to be: Known bad.
Malicious Activity Summary
SmokeLoader
Deletes itself
Unsigned PE
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Uses Task Scheduler COM API
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-02-19 00:01
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-02-19 00:01
Reported
2024-02-19 00:04
Platform
win7-20231215-en
Max time kernel
150s
Max time network
122s
Command Line
Signatures
SmokeLoader
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\18d4c4325fa3930646e04f03a812ccc0c3b8907297db98317bde5a77fed7ea08.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\18d4c4325fa3930646e04f03a812ccc0c3b8907297db98317bde5a77fed7ea08.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\18d4c4325fa3930646e04f03a812ccc0c3b8907297db98317bde5a77fed7ea08.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\18d4c4325fa3930646e04f03a812ccc0c3b8907297db98317bde5a77fed7ea08.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\18d4c4325fa3930646e04f03a812ccc0c3b8907297db98317bde5a77fed7ea08.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\18d4c4325fa3930646e04f03a812ccc0c3b8907297db98317bde5a77fed7ea08.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\18d4c4325fa3930646e04f03a812ccc0c3b8907297db98317bde5a77fed7ea08.exe
"C:\Users\Admin\AppData\Local\Temp\18d4c4325fa3930646e04f03a812ccc0c3b8907297db98317bde5a77fed7ea08.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | sjyey.com | udp |
| PE | 190.12.87.61:80 | sjyey.com | tcp |
| US | 8.8.8.8:53 | babonwo.ru | udp |
| RU | 91.189.114.29:80 | babonwo.ru | tcp |
| US | 8.8.8.8:53 | mth.com.ua | udp |
| US | 8.8.8.8:53 | piratia.pw | udp |
| US | 104.21.79.117:80 | piratia.pw | tcp |
| US | 104.21.79.117:443 | piratia.pw | tcp |
| US | 8.8.8.8:53 | apps.identrust.com | udp |
| GB | 96.17.179.205:80 | apps.identrust.com | tcp |
| US | 104.21.79.117:443 | piratia.pw | tcp |
| US | 8.8.8.8:53 | go-piratia.ru | udp |
| US | 104.21.51.101:80 | go-piratia.ru | tcp |
| US | 104.21.51.101:443 | go-piratia.ru | tcp |
Files
memory/2392-1-0x00000000005A0000-0x00000000006A0000-memory.dmp
memory/2392-2-0x0000000000220000-0x000000000022B000-memory.dmp
memory/2392-3-0x0000000000400000-0x000000000044B000-memory.dmp
memory/1260-4-0x0000000002B90000-0x0000000002BA6000-memory.dmp
memory/2392-5-0x0000000000400000-0x000000000044B000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Cab1C49.tmp
| MD5 | ac05d27423a85adc1622c714f2cb6184 |
| SHA1 | b0fe2b1abddb97837ea0195be70ab2ff14d43198 |
| SHA256 | c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d |
| SHA512 | 6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d |
C:\Users\Admin\AppData\Local\Temp\Tar1D75.tmp
| MD5 | 9c0c641c06238516f27941aa1166d427 |
| SHA1 | 64cd549fb8cf014fcd9312aa7a5b023847b6c977 |
| SHA256 | 4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f |
| SHA512 | 936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | adf8aaea71f25870eef7d7731b0730b4 |
| SHA1 | 5a0866329535811fef71614d7d34a70dafaee890 |
| SHA256 | f7823fa79f1b13533b41fef5f0db257a25a7fc8520b5f17e2f3f465a6447a07a |
| SHA512 | 433c7fc53052abf50a7483c0738fa42b2f2074152f0cfb93addc0b6403636f848de020fa892fc9e925996901d16b0fa25944f61c25f3fb35c3b69dd335702ca9 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-02-19 00:01
Reported
2024-02-19 00:04
Platform
win10v2004-20231215-en
Max time kernel
151s
Max time network
156s
Command Line
Signatures
SmokeLoader
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\18d4c4325fa3930646e04f03a812ccc0c3b8907297db98317bde5a77fed7ea08.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\18d4c4325fa3930646e04f03a812ccc0c3b8907297db98317bde5a77fed7ea08.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\18d4c4325fa3930646e04f03a812ccc0c3b8907297db98317bde5a77fed7ea08.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\18d4c4325fa3930646e04f03a812ccc0c3b8907297db98317bde5a77fed7ea08.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\18d4c4325fa3930646e04f03a812ccc0c3b8907297db98317bde5a77fed7ea08.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\18d4c4325fa3930646e04f03a812ccc0c3b8907297db98317bde5a77fed7ea08.exe | N/A |
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\18d4c4325fa3930646e04f03a812ccc0c3b8907297db98317bde5a77fed7ea08.exe
"C:\Users\Admin\AppData\Local\Temp\18d4c4325fa3930646e04f03a812ccc0c3b8907297db98317bde5a77fed7ea08.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | sjyey.com | udp |
| PE | 190.12.87.61:80 | sjyey.com | tcp |
| US | 8.8.8.8:53 | 61.87.12.190.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.134.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | babonwo.ru | udp |
| RU | 91.189.114.29:80 | babonwo.ru | tcp |
| US | 8.8.8.8:53 | mth.com.ua | udp |
| US | 8.8.8.8:53 | piratia.pw | udp |
| US | 172.67.170.133:80 | piratia.pw | tcp |
| US | 172.67.170.133:443 | piratia.pw | tcp |
| US | 8.8.8.8:53 | 133.170.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 29.114.189.91.in-addr.arpa | udp |
| US | 172.67.170.133:443 | piratia.pw | tcp |
| US | 8.8.8.8:53 | go-piratia.ru | udp |
| US | 104.21.51.101:80 | go-piratia.ru | tcp |
| US | 104.21.51.101:443 | go-piratia.ru | tcp |
| US | 8.8.8.8:53 | 101.51.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.236.111.52.in-addr.arpa | udp |
Files
memory/1144-1-0x0000000000610000-0x0000000000710000-memory.dmp
memory/1144-2-0x00000000005F0000-0x00000000005FB000-memory.dmp
memory/1144-3-0x0000000000400000-0x000000000044B000-memory.dmp
memory/3552-4-0x0000000002780000-0x0000000002796000-memory.dmp
memory/1144-5-0x0000000000400000-0x000000000044B000-memory.dmp
memory/1144-8-0x00000000005F0000-0x00000000005FB000-memory.dmp