Analysis
-
max time kernel
300s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 05:22
Static task
static1
Behavioral task
behavioral1
Sample
6f875483575533ad197bcacb284a148a28430e22e59fffcc32504858b08620aa.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6f875483575533ad197bcacb284a148a28430e22e59fffcc32504858b08620aa.exe
Resource
win10-20240404-en
General
-
Target
6f875483575533ad197bcacb284a148a28430e22e59fffcc32504858b08620aa.exe
-
Size
281KB
-
MD5
fd385f55d814e14ee5a47b21479b3611
-
SHA1
22420004b06d236f1598f8c01775d9d0d0b5bf98
-
SHA256
6f875483575533ad197bcacb284a148a28430e22e59fffcc32504858b08620aa
-
SHA512
3986c8fb73edee8cdd628f5927f91b31754cc577a76fc125d9e174f0b68ddf88c873c7e5fbcd8b2bf0e7f815d4da89a15b644cb1948329dafc02419b36c9d430
-
SSDEEP
3072:/DbcvhZNvsVC80q+C+KU9iOJR86TL5eWMIxxe/b2oO:/cvBvsVlAAU9iODnTVfdxe/
Malware Config
Extracted
smokeloader
pub3
Extracted
smokeloader
2022
http://nidoe.org/tmp/index.php
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1216 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
6f875483575533ad197bcacb284a148a28430e22e59fffcc32504858b08620aa.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6f875483575533ad197bcacb284a148a28430e22e59fffcc32504858b08620aa.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6f875483575533ad197bcacb284a148a28430e22e59fffcc32504858b08620aa.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6f875483575533ad197bcacb284a148a28430e22e59fffcc32504858b08620aa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6f875483575533ad197bcacb284a148a28430e22e59fffcc32504858b08620aa.exepid process 2516 6f875483575533ad197bcacb284a148a28430e22e59fffcc32504858b08620aa.exe 2516 6f875483575533ad197bcacb284a148a28430e22e59fffcc32504858b08620aa.exe 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
6f875483575533ad197bcacb284a148a28430e22e59fffcc32504858b08620aa.exepid process 2516 6f875483575533ad197bcacb284a148a28430e22e59fffcc32504858b08620aa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1216 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f875483575533ad197bcacb284a148a28430e22e59fffcc32504858b08620aa.exe"C:\Users\Admin\AppData\Local\Temp\6f875483575533ad197bcacb284a148a28430e22e59fffcc32504858b08620aa.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2516