Resubmissions
09-04-2024 13:53
240409-q7av3sca71 1009-04-2024 13:53
240409-q699jsgg35 1009-04-2024 13:53
240409-q69ysaca7z 1009-04-2024 13:53
240409-q69m1sca7y 1002-12-2023 07:46
231202-jmdmxaaf8t 10Analysis
-
max time kernel
1792s -
max time network
1608s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
09-04-2024 13:53
Static task
static1
Behavioral task
behavioral1
Sample
caca493c10d47df328c029a270165a21afa50b350ec4f3dd3a6ea72ef2c54823.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
caca493c10d47df328c029a270165a21afa50b350ec4f3dd3a6ea72ef2c54823.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
caca493c10d47df328c029a270165a21afa50b350ec4f3dd3a6ea72ef2c54823.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
caca493c10d47df328c029a270165a21afa50b350ec4f3dd3a6ea72ef2c54823.exe
Resource
win11-20240221-en
General
-
Target
caca493c10d47df328c029a270165a21afa50b350ec4f3dd3a6ea72ef2c54823.exe
-
Size
301KB
-
MD5
d976e27be52536c60076fe9a3a646ad1
-
SHA1
9db98366d212bcd7e3926acb6505c45020604c61
-
SHA256
caca493c10d47df328c029a270165a21afa50b350ec4f3dd3a6ea72ef2c54823
-
SHA512
9a44b70bd35a1467c0af014fa13f7ade42b708928511dced8c4ad6f0813e46e9bd5897d476b9ba3c09972bcb757648925453396796f515aaf03ebff651c3985e
-
SSDEEP
3072:uNg1miw2R2eRVMvRz3jYziACBbFvfy4zoV25kGpYUX35U:qMRnVGDiiJRFMAK
Malware Config
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2700 2872 WerFault.exe 72 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI caca493c10d47df328c029a270165a21afa50b350ec4f3dd3a6ea72ef2c54823.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI caca493c10d47df328c029a270165a21afa50b350ec4f3dd3a6ea72ef2c54823.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI caca493c10d47df328c029a270165a21afa50b350ec4f3dd3a6ea72ef2c54823.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\caca493c10d47df328c029a270165a21afa50b350ec4f3dd3a6ea72ef2c54823.exe"C:\Users\Admin\AppData\Local\Temp\caca493c10d47df328c029a270165a21afa50b350ec4f3dd3a6ea72ef2c54823.exe"1⤵
- Checks SCSI registry key(s)
PID:2872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 3282⤵
- Program crash
PID:2700
-