Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 13:29
Static task
static1
Behavioral task
behavioral1
Sample
a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exe
Resource
win10v2004-20240226-en
General
-
Target
a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exe
-
Size
310KB
-
MD5
822572786b181ffa47f6c8830e0dfbf0
-
SHA1
df0d42904e91401156f5726a29eb86f3cbad14d6
-
SHA256
a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535
-
SHA512
e6c979df6dfa31a0eced2bea427c4b1662d2b0ef3da297a8a06292ea0f462ed25ce07cdc388ccbce9cde36ada82c3dcde564ce47c28e38afeb7aebda6ef062bc
-
SSDEEP
6144:CEYxk/kf7OYoVKpdxzc36p9QhOiWzCqN3O:Cbu/kf7OYocpdxDaOiGNe
Malware Config
Extracted
smokeloader
pub3
Extracted
smokeloader
2022
http://nidoe.org/tmp/index.php
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1256 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exepid process 2872 a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exe 2872 a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exe 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exepid process 2872 a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exe"C:\Users\Admin\AppData\Local\Temp\a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2872