Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 16:07
Static task
static1
Behavioral task
behavioral1
Sample
968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8.exe
Resource
win10v2004-20231215-en
General
-
Target
968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8.exe
-
Size
131KB
-
MD5
a5ded4c1001aff352387e75f27fb2a1f
-
SHA1
fb746a9eee8fc138d982edbc5de2401a8b054ac4
-
SHA256
968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8
-
SHA512
e381d29ab8fc4f929a8a411b72bee6701acc37dd74f3f52a0578c61ef25b37bc3909c8b961d7704125614579069e56b804922d1518d55c13f38d420d4fbc24e7
-
SSDEEP
3072:aK4VduQocFVJgDzOJE+nzWq1VITQ1ZqMj:aK2uQnFVSDzOTDIMrq
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://sjyey.com/tmp/index.php
http://babonwo.ru/tmp/index.php
http://mth.com.ua/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3408 Process not Found -
Executes dropped EXE 1 IoCs
pid Process 568 ghihwbv -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ghihwbv Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ghihwbv Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ghihwbv Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1200 968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8.exe 1200 968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8.exe 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1200 968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8.exe 568 ghihwbv -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8.exe"C:\Users\Admin\AppData\Local\Temp\968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1200
-
C:\Users\Admin\AppData\Roaming\ghihwbvC:\Users\Admin\AppData\Roaming\ghihwbv1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD5a5ded4c1001aff352387e75f27fb2a1f
SHA1fb746a9eee8fc138d982edbc5de2401a8b054ac4
SHA256968a57c7356ede352e24d152d317e576c67408172b22bd5e76cff435f4b45ba8
SHA512e381d29ab8fc4f929a8a411b72bee6701acc37dd74f3f52a0578c61ef25b37bc3909c8b961d7704125614579069e56b804922d1518d55c13f38d420d4fbc24e7