Analysis
-
max time kernel
96s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 13:43
Static task
static1
Behavioral task
behavioral1
Sample
17f9ab3ff113a9dda69111ab6ab03c0da95d47ab419a858b54374e3333ce516b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17f9ab3ff113a9dda69111ab6ab03c0da95d47ab419a858b54374e3333ce516b.exe
Resource
win10v2004-20240412-en
General
-
Target
17f9ab3ff113a9dda69111ab6ab03c0da95d47ab419a858b54374e3333ce516b.exe
-
Size
318KB
-
MD5
87f42958b0558b85a4a799d76330eb89
-
SHA1
12621bd5045dae3d9f1afe6ea8a5363e5fe5ede8
-
SHA256
17f9ab3ff113a9dda69111ab6ab03c0da95d47ab419a858b54374e3333ce516b
-
SHA512
f3a44a108ae8f68525965e345420ecbca14e8a37c74fda78541fbe893dc537a9415a94b22d69118d6f3ac3eda3f0ff2545c58924c6cdd8f77b87d9769f2708ce
-
SSDEEP
3072:K+J2XhieipHjagnf+NHMGpbCccu9vp/R4e0Q/yfstLRRTSPi:KdFip+cwHM0HrD+e0Q/yfQtJ3
Malware Config
Extracted
smokeloader
pub3
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2116 1532 WerFault.exe 17f9ab3ff113a9dda69111ab6ab03c0da95d47ab419a858b54374e3333ce516b.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
17f9ab3ff113a9dda69111ab6ab03c0da95d47ab419a858b54374e3333ce516b.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 17f9ab3ff113a9dda69111ab6ab03c0da95d47ab419a858b54374e3333ce516b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 17f9ab3ff113a9dda69111ab6ab03c0da95d47ab419a858b54374e3333ce516b.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 17f9ab3ff113a9dda69111ab6ab03c0da95d47ab419a858b54374e3333ce516b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17f9ab3ff113a9dda69111ab6ab03c0da95d47ab419a858b54374e3333ce516b.exe"C:\Users\Admin\AppData\Local\Temp\17f9ab3ff113a9dda69111ab6ab03c0da95d47ab419a858b54374e3333ce516b.exe"1⤵
- Checks SCSI registry key(s)
PID:1532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1532 -s 3562⤵
- Program crash
PID:2116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1532 -ip 15321⤵PID:4320