Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 13:23
Static task
static1
Behavioral task
behavioral1
Sample
53a3ddba0b75161ce2d48cfe94f0b45371f879edcbf45756da50f729b664888c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
53a3ddba0b75161ce2d48cfe94f0b45371f879edcbf45756da50f729b664888c.exe
Resource
win10v2004-20240412-en
General
-
Target
53a3ddba0b75161ce2d48cfe94f0b45371f879edcbf45756da50f729b664888c.exe
-
Size
316KB
-
MD5
53801a0bcd9199d21c20df467beee881
-
SHA1
1c0b7ebe21c9abac3416ed32b1238c8607090f4d
-
SHA256
53a3ddba0b75161ce2d48cfe94f0b45371f879edcbf45756da50f729b664888c
-
SHA512
e1a33b9d0c075e14589bf1753b711fac586a353ea798c9236d21d7c3cbb1e4de23343a123a1fcf903153f955d1b8b2a6614c6803ee23946914c741889b8ba1b4
-
SSDEEP
3072:z0iD5S2RZihP2+ccK+EXWkDo/jXnKw3MrMhLv1tmoL7XMwY1olXM4Q6d:FHON2ZW9n3M6vN7ZYi
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://nidoe.org/tmp/index.php
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1216 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 53a3ddba0b75161ce2d48cfe94f0b45371f879edcbf45756da50f729b664888c.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 53a3ddba0b75161ce2d48cfe94f0b45371f879edcbf45756da50f729b664888c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 53a3ddba0b75161ce2d48cfe94f0b45371f879edcbf45756da50f729b664888c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1964 53a3ddba0b75161ce2d48cfe94f0b45371f879edcbf45756da50f729b664888c.exe 1964 53a3ddba0b75161ce2d48cfe94f0b45371f879edcbf45756da50f729b664888c.exe 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1964 53a3ddba0b75161ce2d48cfe94f0b45371f879edcbf45756da50f729b664888c.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1216 Process not Found 1216 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1216 Process not Found 1216 Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\53a3ddba0b75161ce2d48cfe94f0b45371f879edcbf45756da50f729b664888c.exe"C:\Users\Admin\AppData\Local\Temp\53a3ddba0b75161ce2d48cfe94f0b45371f879edcbf45756da50f729b664888c.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1964