Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19/02/2024, 16:35
Static task
static1
Behavioral task
behavioral1
Sample
f89ca16569af9a2a3e03f825ad6eef16d4d32fc7e5cfc30c9cd30072f54b0e3b.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f89ca16569af9a2a3e03f825ad6eef16d4d32fc7e5cfc30c9cd30072f54b0e3b.exe
Resource
win10v2004-20231215-en
General
-
Target
f89ca16569af9a2a3e03f825ad6eef16d4d32fc7e5cfc30c9cd30072f54b0e3b.exe
-
Size
233KB
-
MD5
212227578c45b01ea60be9625108a2b8
-
SHA1
4a126a237fea9d5a144655123e17fe40ebce5fc9
-
SHA256
f89ca16569af9a2a3e03f825ad6eef16d4d32fc7e5cfc30c9cd30072f54b0e3b
-
SHA512
2de3dcbf84240db00a60f388f6aec394a1a8a0c984a1faf09da9a18a5e7bf2e75fa63a57377a85c7d32b25518e4373ec1352c398fea909fadd0e050ec8baf0a8
-
SSDEEP
3072:KFBZ9zen3Oc1FJfCv0Y6jHIxnW9PHHX82GEYyEFADOIzJ70x8b+AuXB55Sm48MA:0c+SCv0RHIxnUPHX8gG2DvZ+8uwf
Malware Config
Extracted
smokeloader
pub3
Extracted
smokeloader
2022
http://sjyey.com/tmp/index.php
http://babonwo.ru/tmp/index.php
http://mth.com.ua/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1184 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f89ca16569af9a2a3e03f825ad6eef16d4d32fc7e5cfc30c9cd30072f54b0e3b.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f89ca16569af9a2a3e03f825ad6eef16d4d32fc7e5cfc30c9cd30072f54b0e3b.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f89ca16569af9a2a3e03f825ad6eef16d4d32fc7e5cfc30c9cd30072f54b0e3b.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2744 f89ca16569af9a2a3e03f825ad6eef16d4d32fc7e5cfc30c9cd30072f54b0e3b.exe 2744 f89ca16569af9a2a3e03f825ad6eef16d4d32fc7e5cfc30c9cd30072f54b0e3b.exe 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found 1184 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2744 f89ca16569af9a2a3e03f825ad6eef16d4d32fc7e5cfc30c9cd30072f54b0e3b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f89ca16569af9a2a3e03f825ad6eef16d4d32fc7e5cfc30c9cd30072f54b0e3b.exe"C:\Users\Admin\AppData\Local\Temp\f89ca16569af9a2a3e03f825ad6eef16d4d32fc7e5cfc30c9cd30072f54b0e3b.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2744