Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20/02/2024, 16:07
Static task
static1
Behavioral task
behavioral1
Sample
968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8.exe
Resource
win10v2004-20231215-en
General
-
Target
968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8.exe
-
Size
131KB
-
MD5
a5ded4c1001aff352387e75f27fb2a1f
-
SHA1
fb746a9eee8fc138d982edbc5de2401a8b054ac4
-
SHA256
968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8
-
SHA512
e381d29ab8fc4f929a8a411b72bee6701acc37dd74f3f52a0578c61ef25b37bc3909c8b961d7704125614579069e56b804922d1518d55c13f38d420d4fbc24e7
-
SSDEEP
3072:aK4VduQocFVJgDzOJE+nzWq1VITQ1ZqMj:aK2uQnFVSDzOTDIMrq
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://sjyey.com/tmp/index.php
http://babonwo.ru/tmp/index.php
http://mth.com.ua/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1200 Process not Found -
Executes dropped EXE 1 IoCs
pid Process 1004 weidaej -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI weidaej Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI weidaej Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI weidaej -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2148 968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8.exe 2148 968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2148 968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8.exe 1004 weidaej -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1004 2044 taskeng.exe 31 PID 2044 wrote to memory of 1004 2044 taskeng.exe 31 PID 2044 wrote to memory of 1004 2044 taskeng.exe 31 PID 2044 wrote to memory of 1004 2044 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8.exe"C:\Users\Admin\AppData\Local\Temp\968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2148
-
C:\Windows\system32\taskeng.exetaskeng.exe {50E25149-5818-44B7-BC49-98B65E3F0420} S-1-5-21-3818056530-936619650-3554021955-1000:SFVRQGEO\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Roaming\weidaejC:\Users\Admin\AppData\Roaming\weidaej2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD5a5ded4c1001aff352387e75f27fb2a1f
SHA1fb746a9eee8fc138d982edbc5de2401a8b054ac4
SHA256968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8
SHA512e381d29ab8fc4f929a8a411b72bee6701acc37dd74f3f52a0578c61ef25b37bc3909c8b961d7704125614579069e56b804922d1518d55c13f38d420d4fbc24e7