Analysis
-
max time kernel
300s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-04-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
f2bc91641d8c2e71bb591147ffa6d52ffe83de6fefee344bb53f603785c9a010.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f2bc91641d8c2e71bb591147ffa6d52ffe83de6fefee344bb53f603785c9a010.exe
Resource
win10-20240404-en
General
-
Target
f2bc91641d8c2e71bb591147ffa6d52ffe83de6fefee344bb53f603785c9a010.exe
-
Size
299KB
-
MD5
f9769d561a0edc190a71205dbb375fa5
-
SHA1
77118f9fd6ea57c98f10e541bc634a635027d47e
-
SHA256
f2bc91641d8c2e71bb591147ffa6d52ffe83de6fefee344bb53f603785c9a010
-
SHA512
745ff22f5391fd771039103e1ed9c6fcebdf052ca166a1b361369b010be289f9edc0e731b06a4ecb3bc2611e0ebdee5516eea062f2f79c8069d427c8c811f785
-
SSDEEP
3072:u4K3l3FgI0vE6d+2rbufS8sO23njSJanqebDEuoAN5O0yozsAFKZ:uLCEuNSmS4bDETS55yozsAFK
Malware Config
Extracted
smokeloader
pub3
Extracted
smokeloader
2022
http://nidoe.org/tmp/index.php
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1196 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
f2bc91641d8c2e71bb591147ffa6d52ffe83de6fefee344bb53f603785c9a010.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f2bc91641d8c2e71bb591147ffa6d52ffe83de6fefee344bb53f603785c9a010.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f2bc91641d8c2e71bb591147ffa6d52ffe83de6fefee344bb53f603785c9a010.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f2bc91641d8c2e71bb591147ffa6d52ffe83de6fefee344bb53f603785c9a010.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
f2bc91641d8c2e71bb591147ffa6d52ffe83de6fefee344bb53f603785c9a010.exepid process 2924 f2bc91641d8c2e71bb591147ffa6d52ffe83de6fefee344bb53f603785c9a010.exe 2924 f2bc91641d8c2e71bb591147ffa6d52ffe83de6fefee344bb53f603785c9a010.exe 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
f2bc91641d8c2e71bb591147ffa6d52ffe83de6fefee344bb53f603785c9a010.exepid process 2924 f2bc91641d8c2e71bb591147ffa6d52ffe83de6fefee344bb53f603785c9a010.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1196
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2bc91641d8c2e71bb591147ffa6d52ffe83de6fefee344bb53f603785c9a010.exe"C:\Users\Admin\AppData\Local\Temp\f2bc91641d8c2e71bb591147ffa6d52ffe83de6fefee344bb53f603785c9a010.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2924