Analysis
-
max time kernel
30s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-03-2024 02:20
Static task
static1
Behavioral task
behavioral1
Sample
a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe
Resource
win10v2004-20240226-en
General
-
Target
a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe
-
Size
208KB
-
MD5
9b10a29569abdddb99d729e07f51d62a
-
SHA1
c152b192772a1fdc2dcf17faf4319fb0173ce55d
-
SHA256
a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef
-
SHA512
237b5c3f390030d256cba7af05f8b4d45f0c7459127891a12d3a644b28df2da09109325e32457e83a1af93885abd75fc9da79bb4864157ebc15275f6673617b1
-
SSDEEP
3072:PMCZ3MKPMkeED9EqQvbMaOnrDN08QKuV9w1RBeg8+/yGYV:kCZ5MiD9EqQvZOG8QKOkRBeA
Malware Config
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1240 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exepid process 2220 a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe 2220 a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 1240 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exepid process 2220 a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe"C:\Users\Admin\AppData\Local\Temp\a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2220