Analysis
-
max time kernel
157s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 13:29
Static task
static1
Behavioral task
behavioral1
Sample
a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exe
Resource
win10v2004-20240226-en
General
-
Target
a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exe
-
Size
310KB
-
MD5
822572786b181ffa47f6c8830e0dfbf0
-
SHA1
df0d42904e91401156f5726a29eb86f3cbad14d6
-
SHA256
a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535
-
SHA512
e6c979df6dfa31a0eced2bea427c4b1662d2b0ef3da297a8a06292ea0f462ed25ce07cdc388ccbce9cde36ada82c3dcde564ce47c28e38afeb7aebda6ef062bc
-
SSDEEP
6144:CEYxk/kf7OYoVKpdxzc36p9QhOiWzCqN3O:Cbu/kf7OYocpdxDaOiGNe
Malware Config
Extracted
smokeloader
pub3
Extracted
smokeloader
2022
http://nidoe.org/tmp/index.php
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 3332 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exepid process 1152 a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exe 1152 a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exe 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exepid process 1152 a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exe"C:\Users\Admin\AppData\Local\Temp\a7abbbf02fcd2e38feafd5b6edf2699d3457256a3b635da9a62dd8b6bfbf1535.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1152
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4136 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:624