Analysis
-
max time kernel
151s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-04-2024 10:00
Static task
static1
Behavioral task
behavioral1
Sample
c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exe
Resource
win10v2004-20240226-en
General
-
Target
c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exe
-
Size
211KB
-
MD5
28c17350f0da6941f68bbea0eb5af380
-
SHA1
42d3ea0b53b6f76b729a9cef45341fae29933d88
-
SHA256
c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b
-
SHA512
b1bd4d2d1787575b7d5155926aa248203b317f33e13eb237ecb1d33353c3146e6ed67da239f0e96ff98adf8aa7309e6f37f666107176bb6461621d7287fb750f
-
SSDEEP
3072:BIVw4zCuQGezasu4/2z6EuQ/yu0ZsBMRpSQDB8mm3CmO:BIm4GudBsukQ5o8NR
Malware Config
Extracted
smokeloader
pub3
Extracted
smokeloader
2022
http://sjyey.com/tmp/index.php
http://babonwo.ru/tmp/index.php
http://mth.com.ua/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1200 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exepid process 1392 c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exe 1392 c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exe 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exepid process 1392 c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exe"C:\Users\Admin\AppData\Local\Temp\c40fe915433c1a8094a858affe62c6079154c668645f8e17751e7f39ebf4d31b.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1200-4-0x00000000026B0000-0x00000000026C6000-memory.dmpFilesize
88KB
-
memory/1392-1-0x0000000002C80000-0x0000000002D80000-memory.dmpFilesize
1024KB
-
memory/1392-2-0x0000000000220000-0x000000000022B000-memory.dmpFilesize
44KB
-
memory/1392-3-0x0000000000400000-0x0000000002BE0000-memory.dmpFilesize
39.9MB
-
memory/1392-5-0x0000000000400000-0x0000000002BE0000-memory.dmpFilesize
39.9MB
-
memory/1392-8-0x0000000000220000-0x000000000022B000-memory.dmpFilesize
44KB