Overview
overview
10Static
static
3a041839327...d1.exe
windows7-x64
10a041839327...d1.exe
windows10-1703-x64
10a041839327...d1.exe
windows10-2004-x64
10a041839327...d1.exe
windows11-21h2-x64
10b102ed1018...01.exe
windows7-x64
10b102ed1018...01.exe
windows10-1703-x64
10b102ed1018...01.exe
windows10-2004-x64
10b102ed1018...01.exe
windows11-21h2-x64
1650f0d694c...7e.exe
windows7-x64
10650f0d694c...7e.exe
windows10-1703-x64
10650f0d694c...7e.exe
windows10-2004-x64
10650f0d694c...7e.exe
windows11-21h2-x64
1Analysis
-
max time kernel
1800s -
max time network
1562s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-04-2024 12:16
Static task
static1
Behavioral task
behavioral1
Sample
a041839327295fde3df12ea61374abd19c4499b87e211757c593179d6a6870d1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a041839327295fde3df12ea61374abd19c4499b87e211757c593179d6a6870d1.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
a041839327295fde3df12ea61374abd19c4499b87e211757c593179d6a6870d1.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
a041839327295fde3df12ea61374abd19c4499b87e211757c593179d6a6870d1.exe
Resource
win11-20240412-en
Behavioral task
behavioral5
Sample
b102ed1018de0b7faea37ca86f27ba3025c0c70f28417ac3e9ef09d32617f801.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
b102ed1018de0b7faea37ca86f27ba3025c0c70f28417ac3e9ef09d32617f801.exe
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
b102ed1018de0b7faea37ca86f27ba3025c0c70f28417ac3e9ef09d32617f801.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral8
Sample
b102ed1018de0b7faea37ca86f27ba3025c0c70f28417ac3e9ef09d32617f801.exe
Resource
win11-20240412-en
Behavioral task
behavioral9
Sample
650f0d694c0928d88aeeed649cf629fc8a7bec604563bca716b1688227e0cc7e.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
650f0d694c0928d88aeeed649cf629fc8a7bec604563bca716b1688227e0cc7e.exe
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
650f0d694c0928d88aeeed649cf629fc8a7bec604563bca716b1688227e0cc7e.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral12
Sample
650f0d694c0928d88aeeed649cf629fc8a7bec604563bca716b1688227e0cc7e.exe
Resource
win11-20240412-en
General
-
Target
a041839327295fde3df12ea61374abd19c4499b87e211757c593179d6a6870d1.exe
-
Size
255KB
-
MD5
7fdba86bba0508054fd1f058a6a2d134
-
SHA1
131aa6889c55b9348a452fdf369fe54c2f05ba48
-
SHA256
a041839327295fde3df12ea61374abd19c4499b87e211757c593179d6a6870d1
-
SHA512
901b368bf99f8b715186d22d73bbb80a87f8498fd375b9023d798651f5c0939d01d3ec3ec50ce148699b6228aca59711883e9a30e986c1c5d18e95e8ab1967f1
-
SSDEEP
6144:VU8vCLXBfoCmgZw6NNTs9VUkIqj8m+z7:VU8apkQw6N6LUkpv+z7
Malware Config
Extracted
smokeloader
2022
http://furubujjul.net/
http://starvestitibo.org/
http://liubertiyyyul.net/
http://bururutu44org.org/
http://nvulukuluir.net/
http://gulutina49org.org/
http://hulimudulinu.net/
http://stalnnuytyt.org/
http://nuluitnulo.me/
http://youyouumenia5.org/
http://guluiiiimnstra.net/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1232 -
Executes dropped EXE 3 IoCs
Processes:
ucbrgfcucbrgfcucbrgfcpid process 1060 ucbrgfc 1296 ucbrgfc 1532 ucbrgfc -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
ucbrgfcucbrgfcucbrgfca041839327295fde3df12ea61374abd19c4499b87e211757c593179d6a6870d1.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ucbrgfc Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ucbrgfc Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ucbrgfc Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ucbrgfc Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ucbrgfc Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ucbrgfc Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ucbrgfc Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ucbrgfc Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a041839327295fde3df12ea61374abd19c4499b87e211757c593179d6a6870d1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a041839327295fde3df12ea61374abd19c4499b87e211757c593179d6a6870d1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a041839327295fde3df12ea61374abd19c4499b87e211757c593179d6a6870d1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ucbrgfc -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a041839327295fde3df12ea61374abd19c4499b87e211757c593179d6a6870d1.exepid process 1736 a041839327295fde3df12ea61374abd19c4499b87e211757c593179d6a6870d1.exe 1736 a041839327295fde3df12ea61374abd19c4499b87e211757c593179d6a6870d1.exe 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 1232 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1232 -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
a041839327295fde3df12ea61374abd19c4499b87e211757c593179d6a6870d1.exeucbrgfcucbrgfcucbrgfcpid process 1736 a041839327295fde3df12ea61374abd19c4499b87e211757c593179d6a6870d1.exe 1060 ucbrgfc 1296 ucbrgfc 1532 ucbrgfc -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1232 Token: SeShutdownPrivilege 1232 Token: SeShutdownPrivilege 1232 Token: SeShutdownPrivilege 1232 Token: SeShutdownPrivilege 1232 Token: SeShutdownPrivilege 1232 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
taskeng.exetaskeng.exetaskeng.exedescription pid process target process PID 1500 wrote to memory of 1060 1500 taskeng.exe ucbrgfc PID 1500 wrote to memory of 1060 1500 taskeng.exe ucbrgfc PID 1500 wrote to memory of 1060 1500 taskeng.exe ucbrgfc PID 1500 wrote to memory of 1060 1500 taskeng.exe ucbrgfc PID 2264 wrote to memory of 1296 2264 taskeng.exe ucbrgfc PID 2264 wrote to memory of 1296 2264 taskeng.exe ucbrgfc PID 2264 wrote to memory of 1296 2264 taskeng.exe ucbrgfc PID 2264 wrote to memory of 1296 2264 taskeng.exe ucbrgfc PID 680 wrote to memory of 1532 680 taskeng.exe ucbrgfc PID 680 wrote to memory of 1532 680 taskeng.exe ucbrgfc PID 680 wrote to memory of 1532 680 taskeng.exe ucbrgfc PID 680 wrote to memory of 1532 680 taskeng.exe ucbrgfc -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a041839327295fde3df12ea61374abd19c4499b87e211757c593179d6a6870d1.exe"C:\Users\Admin\AppData\Local\Temp\a041839327295fde3df12ea61374abd19c4499b87e211757c593179d6a6870d1.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1736
-
C:\Windows\system32\taskeng.exetaskeng.exe {F1389875-63AB-4777-A68A-513F8A617051} S-1-5-21-1658372521-4246568289-2509113762-1000:PIRBKNPS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Roaming\ucbrgfcC:\Users\Admin\AppData\Roaming\ucbrgfc2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1060
-
C:\Windows\system32\taskeng.exetaskeng.exe {F2714DB0-B267-4583-BDB8-900231B365AD} S-1-5-21-1658372521-4246568289-2509113762-1000:PIRBKNPS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Roaming\ucbrgfcC:\Users\Admin\AppData\Roaming\ucbrgfc2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1296
-
C:\Windows\system32\taskeng.exetaskeng.exe {98CFCDF8-6CF4-4AB8-A936-56CA3CBB27CF} S-1-5-21-1658372521-4246568289-2509113762-1000:PIRBKNPS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Roaming\ucbrgfcC:\Users\Admin\AppData\Roaming\ucbrgfc2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD57fdba86bba0508054fd1f058a6a2d134
SHA1131aa6889c55b9348a452fdf369fe54c2f05ba48
SHA256a041839327295fde3df12ea61374abd19c4499b87e211757c593179d6a6870d1
SHA512901b368bf99f8b715186d22d73bbb80a87f8498fd375b9023d798651f5c0939d01d3ec3ec50ce148699b6228aca59711883e9a30e986c1c5d18e95e8ab1967f1