Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 19:22
Static task
static1
Behavioral task
behavioral1
Sample
ba004d36633d8fbf6d82a9abca0a52b21363a9b7d45ed729ad79e5b87980be46.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ba004d36633d8fbf6d82a9abca0a52b21363a9b7d45ed729ad79e5b87980be46.exe
Resource
win10v2004-20240412-en
General
-
Target
ba004d36633d8fbf6d82a9abca0a52b21363a9b7d45ed729ad79e5b87980be46.exe
-
Size
322KB
-
MD5
3053a6bb85f0d36c3b9d5400ad33ed0c
-
SHA1
947e246b346965e64474caad8f50a3f364a82eb7
-
SHA256
ba004d36633d8fbf6d82a9abca0a52b21363a9b7d45ed729ad79e5b87980be46
-
SHA512
4d95715ed5c9e88ac511cffdde256fe529b84e057589d1937513b1691e342b105100d6e0f8b98f3da91d45275f5f3d2ab366eaf90c3427520426471a0753a26e
-
SSDEEP
3072:FFcLGmjm4feH7uZCUV9pvY8oSSS/Zx5ZUN6uWveONDZuUt5cUl7:FuLGmaYebeCq9pv4S/rUNXHON1
Malware Config
Extracted
smokeloader
pub3
Extracted
smokeloader
2022
http://nidoe.org/tmp/index.php
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1224 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
ba004d36633d8fbf6d82a9abca0a52b21363a9b7d45ed729ad79e5b87980be46.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ba004d36633d8fbf6d82a9abca0a52b21363a9b7d45ed729ad79e5b87980be46.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ba004d36633d8fbf6d82a9abca0a52b21363a9b7d45ed729ad79e5b87980be46.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ba004d36633d8fbf6d82a9abca0a52b21363a9b7d45ed729ad79e5b87980be46.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ba004d36633d8fbf6d82a9abca0a52b21363a9b7d45ed729ad79e5b87980be46.exepid process 2136 ba004d36633d8fbf6d82a9abca0a52b21363a9b7d45ed729ad79e5b87980be46.exe 2136 ba004d36633d8fbf6d82a9abca0a52b21363a9b7d45ed729ad79e5b87980be46.exe 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
ba004d36633d8fbf6d82a9abca0a52b21363a9b7d45ed729ad79e5b87980be46.exepid process 2136 ba004d36633d8fbf6d82a9abca0a52b21363a9b7d45ed729ad79e5b87980be46.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba004d36633d8fbf6d82a9abca0a52b21363a9b7d45ed729ad79e5b87980be46.exe"C:\Users\Admin\AppData\Local\Temp\ba004d36633d8fbf6d82a9abca0a52b21363a9b7d45ed729ad79e5b87980be46.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2136