Analysis
-
max time kernel
150s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 08:27
Static task
static1
Behavioral task
behavioral1
Sample
52c33f70e6960ef4aa8054260d938452d91c49024f4ce042ab00c2387e7fd7f5.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
52c33f70e6960ef4aa8054260d938452d91c49024f4ce042ab00c2387e7fd7f5.exe
Resource
win10v2004-20240412-en
General
-
Target
52c33f70e6960ef4aa8054260d938452d91c49024f4ce042ab00c2387e7fd7f5.exe
-
Size
237KB
-
MD5
3fd46ed8c0b43edb6a73e27a46a66b69
-
SHA1
4b758854b2fd8b92268efe79ec2cb5cd8288f824
-
SHA256
52c33f70e6960ef4aa8054260d938452d91c49024f4ce042ab00c2387e7fd7f5
-
SHA512
8dc022f5e90850a4d72fbbdb9df1ca40c0b8da84ad7186dcdcefa861eeb90b5cab731e566976c887e7e3242d8c7042458e88c24d202d4ef107a4fa0874aa6b25
-
SSDEEP
3072:F7P4LTLgXI1gEFdBTIrDYXEfW4VSpbpD9/c55RGJeONDZuUt5cUQ:FT4LHgXI51IrDYcvVS3pI40ON1
Malware Config
Extracted
smokeloader
pub3
Extracted
smokeloader
2022
http://nidoe.org/tmp/index.php
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1200 -
Executes dropped EXE 1 IoCs
Processes:
dajicgapid process 1548 dajicga -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
52c33f70e6960ef4aa8054260d938452d91c49024f4ce042ab00c2387e7fd7f5.exedajicgadescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 52c33f70e6960ef4aa8054260d938452d91c49024f4ce042ab00c2387e7fd7f5.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 52c33f70e6960ef4aa8054260d938452d91c49024f4ce042ab00c2387e7fd7f5.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 52c33f70e6960ef4aa8054260d938452d91c49024f4ce042ab00c2387e7fd7f5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dajicga Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dajicga Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dajicga -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
52c33f70e6960ef4aa8054260d938452d91c49024f4ce042ab00c2387e7fd7f5.exepid process 2416 52c33f70e6960ef4aa8054260d938452d91c49024f4ce042ab00c2387e7fd7f5.exe 2416 52c33f70e6960ef4aa8054260d938452d91c49024f4ce042ab00c2387e7fd7f5.exe 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
52c33f70e6960ef4aa8054260d938452d91c49024f4ce042ab00c2387e7fd7f5.exedajicgapid process 2416 52c33f70e6960ef4aa8054260d938452d91c49024f4ce042ab00c2387e7fd7f5.exe 1548 dajicga -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 2952 wrote to memory of 1548 2952 taskeng.exe dajicga PID 2952 wrote to memory of 1548 2952 taskeng.exe dajicga PID 2952 wrote to memory of 1548 2952 taskeng.exe dajicga PID 2952 wrote to memory of 1548 2952 taskeng.exe dajicga -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\52c33f70e6960ef4aa8054260d938452d91c49024f4ce042ab00c2387e7fd7f5.exe"C:\Users\Admin\AppData\Local\Temp\52c33f70e6960ef4aa8054260d938452d91c49024f4ce042ab00c2387e7fd7f5.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2416
-
C:\Windows\system32\taskeng.exetaskeng.exe {DFFD8C2C-435F-4D95-9A76-6779D817BA66} S-1-5-21-2248906074-2862704502-246302768-1000:GHPZRGFC\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Roaming\dajicgaC:\Users\Admin\AppData\Roaming\dajicga2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237KB
MD53fd46ed8c0b43edb6a73e27a46a66b69
SHA14b758854b2fd8b92268efe79ec2cb5cd8288f824
SHA25652c33f70e6960ef4aa8054260d938452d91c49024f4ce042ab00c2387e7fd7f5
SHA5128dc022f5e90850a4d72fbbdb9df1ca40c0b8da84ad7186dcdcefa861eeb90b5cab731e566976c887e7e3242d8c7042458e88c24d202d4ef107a4fa0874aa6b25