Analysis
-
max time kernel
300s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15-04-2024 05:03
Static task
static1
Behavioral task
behavioral1
Sample
ec9f077cc4e2f967ec024ebaffb4e40e31785bb9a279633a72b970f0c249936c.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ec9f077cc4e2f967ec024ebaffb4e40e31785bb9a279633a72b970f0c249936c.exe
Resource
win10-20240404-en
General
-
Target
ec9f077cc4e2f967ec024ebaffb4e40e31785bb9a279633a72b970f0c249936c.exe
-
Size
254KB
-
MD5
73196807c34d7f9185867d4c7e2a2dfc
-
SHA1
b6d82e3fe2d82bd6aee6c5efe13c9d61bb979aaa
-
SHA256
ec9f077cc4e2f967ec024ebaffb4e40e31785bb9a279633a72b970f0c249936c
-
SHA512
b6483816973be1c78dc2f033e16fcbd1aa7fe0d833ba7bf3b144a2249137a68d502fe5f54275300bfdbfb3060cdcca75ed7f7f1e30979fc50b05b3047cbcec9c
-
SSDEEP
3072:YCLa+1FRVlGnriaStbk5AFosHbwVNE5+cQRM/+1CB44:YCLv1F7kudtbsyos7m/cQRaR
Malware Config
Extracted
smokeloader
pub3
Extracted
smokeloader
2022
http://nidoe.org/tmp/index.php
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1152 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
ec9f077cc4e2f967ec024ebaffb4e40e31785bb9a279633a72b970f0c249936c.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ec9f077cc4e2f967ec024ebaffb4e40e31785bb9a279633a72b970f0c249936c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ec9f077cc4e2f967ec024ebaffb4e40e31785bb9a279633a72b970f0c249936c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ec9f077cc4e2f967ec024ebaffb4e40e31785bb9a279633a72b970f0c249936c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ec9f077cc4e2f967ec024ebaffb4e40e31785bb9a279633a72b970f0c249936c.exepid process 1636 ec9f077cc4e2f967ec024ebaffb4e40e31785bb9a279633a72b970f0c249936c.exe 1636 ec9f077cc4e2f967ec024ebaffb4e40e31785bb9a279633a72b970f0c249936c.exe 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 1152 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
ec9f077cc4e2f967ec024ebaffb4e40e31785bb9a279633a72b970f0c249936c.exepid process 1636 ec9f077cc4e2f967ec024ebaffb4e40e31785bb9a279633a72b970f0c249936c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1152
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec9f077cc4e2f967ec024ebaffb4e40e31785bb9a279633a72b970f0c249936c.exe"C:\Users\Admin\AppData\Local\Temp\ec9f077cc4e2f967ec024ebaffb4e40e31785bb9a279633a72b970f0c249936c.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1636