Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08-03-2024 18:39
Static task
static1
Behavioral task
behavioral1
Sample
898a57544bdfbaac62372f1b7bc63610750c0f377c66c372e34909e6c5f474c5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
898a57544bdfbaac62372f1b7bc63610750c0f377c66c372e34909e6c5f474c5.exe
Resource
win10v2004-20240226-en
General
-
Target
898a57544bdfbaac62372f1b7bc63610750c0f377c66c372e34909e6c5f474c5.exe
-
Size
179KB
-
MD5
894baeb7be85c01940e2043eacd82c7a
-
SHA1
aff64515061e22951ac3a917dfd4c7a66443d9fb
-
SHA256
898a57544bdfbaac62372f1b7bc63610750c0f377c66c372e34909e6c5f474c5
-
SHA512
15e2093d7082f2a3a2e0175a87061ebea924b8a7b511836bbd8b4f9a2aa11b80b420016d0b9f388724f755e4751f70db5bd77138710f4e8d1764bc569be62c7b
-
SSDEEP
3072:y/yBN6fEr6ADs9r7xOsj139boI2WIkP4eXUkyKc0AFOAL6uQX:yuJ+ADIr7Asjl9b1f4eVyKUFOAL
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://wirtshauspost.at/tmp/
http://msktk.ru/tmp/
http://soetegem.com/tmp/
http://gromograd.ru/tmp/
http://talesofpirates.net/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1380 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 898a57544bdfbaac62372f1b7bc63610750c0f377c66c372e34909e6c5f474c5.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 898a57544bdfbaac62372f1b7bc63610750c0f377c66c372e34909e6c5f474c5.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 898a57544bdfbaac62372f1b7bc63610750c0f377c66c372e34909e6c5f474c5.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3028 898a57544bdfbaac62372f1b7bc63610750c0f377c66c372e34909e6c5f474c5.exe 3028 898a57544bdfbaac62372f1b7bc63610750c0f377c66c372e34909e6c5f474c5.exe 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3028 898a57544bdfbaac62372f1b7bc63610750c0f377c66c372e34909e6c5f474c5.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1380 Process not Found 1380 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1380 Process not Found 1380 Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\898a57544bdfbaac62372f1b7bc63610750c0f377c66c372e34909e6c5f474c5.exe"C:\Users\Admin\AppData\Local\Temp\898a57544bdfbaac62372f1b7bc63610750c0f377c66c372e34909e6c5f474c5.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3028