Analysis
-
max time kernel
157s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 14:46
Static task
static1
Behavioral task
behavioral1
Sample
006ab1b11bfdbf1e4a5dd2291e6e63d9f16e2896a5a0bec1ef46000307478ad8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
006ab1b11bfdbf1e4a5dd2291e6e63d9f16e2896a5a0bec1ef46000307478ad8.exe
Resource
win10v2004-20240226-en
General
-
Target
006ab1b11bfdbf1e4a5dd2291e6e63d9f16e2896a5a0bec1ef46000307478ad8.exe
-
Size
242KB
-
MD5
e0606af1cf37281e1407ccc449c3d087
-
SHA1
acbd7e2e9e28e512b2b283dbd2e42394cdd7e58f
-
SHA256
006ab1b11bfdbf1e4a5dd2291e6e63d9f16e2896a5a0bec1ef46000307478ad8
-
SHA512
c6d62cb5510743f9090d489c4b889d5e55198a76d1888a91c90fcb11bb3c28670756d640fc4e25aa2c79b98f055bb5a68c05083025d6b13f8c7f8924afd67f30
-
SSDEEP
3072:LYi7ktVPczJaKr9+7bQKcEdv0yEkMnOvpVj0zhp4izwwZmM9fieCOGDdX1ODBlNs:LYi4tN97b+8MORxIp4izw/yieiMd
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://gxutc2c.com/tmp/index.php
http://proekt8.ru/tmp/index.php
http://mth.com.ua/tmp/index.php
http://pirateking.online/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3384 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 006ab1b11bfdbf1e4a5dd2291e6e63d9f16e2896a5a0bec1ef46000307478ad8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 006ab1b11bfdbf1e4a5dd2291e6e63d9f16e2896a5a0bec1ef46000307478ad8.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 006ab1b11bfdbf1e4a5dd2291e6e63d9f16e2896a5a0bec1ef46000307478ad8.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4640 006ab1b11bfdbf1e4a5dd2291e6e63d9f16e2896a5a0bec1ef46000307478ad8.exe 4640 006ab1b11bfdbf1e4a5dd2291e6e63d9f16e2896a5a0bec1ef46000307478ad8.exe 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found 3384 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4640 006ab1b11bfdbf1e4a5dd2291e6e63d9f16e2896a5a0bec1ef46000307478ad8.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\006ab1b11bfdbf1e4a5dd2291e6e63d9f16e2896a5a0bec1ef46000307478ad8.exe"C:\Users\Admin\AppData\Local\Temp\006ab1b11bfdbf1e4a5dd2291e6e63d9f16e2896a5a0bec1ef46000307478ad8.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4640
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4000 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:81⤵PID:4496