Analysis
-
max time kernel
300s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29-04-2024 05:13
Static task
static1
Behavioral task
behavioral1
Sample
a3087c4d7eaac762b9647e90b3f359b5638dc1f2af5bf8df90d6c3d0d8330844.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a3087c4d7eaac762b9647e90b3f359b5638dc1f2af5bf8df90d6c3d0d8330844.exe
Resource
win10-20240404-en
General
-
Target
a3087c4d7eaac762b9647e90b3f359b5638dc1f2af5bf8df90d6c3d0d8330844.exe
-
Size
174KB
-
MD5
0b221713136f853c4b594ebdd8da873b
-
SHA1
44f696fb4743a84bc06cf57ebdc30f0cec2d8f26
-
SHA256
a3087c4d7eaac762b9647e90b3f359b5638dc1f2af5bf8df90d6c3d0d8330844
-
SHA512
2b5b8b8d34a7434477d46b546c412404cf11609cad0a6a10dd2ee3a6cd963c291f776cbebb9cb7a8673e1d07f2177494ecb442996379dc0d2ff2b9b87f57ce1b
-
SSDEEP
3072:ccnHPlpU6gXu/okNQNb7D6B44ggsB52Iw2:ccnHngUwP6B44ggsaIw
Malware Config
Extracted
smokeloader
pub3
Extracted
smokeloader
2022
http://nidoe.org/tmp/index.php
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1196 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
a3087c4d7eaac762b9647e90b3f359b5638dc1f2af5bf8df90d6c3d0d8330844.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a3087c4d7eaac762b9647e90b3f359b5638dc1f2af5bf8df90d6c3d0d8330844.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a3087c4d7eaac762b9647e90b3f359b5638dc1f2af5bf8df90d6c3d0d8330844.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a3087c4d7eaac762b9647e90b3f359b5638dc1f2af5bf8df90d6c3d0d8330844.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a3087c4d7eaac762b9647e90b3f359b5638dc1f2af5bf8df90d6c3d0d8330844.exepid process 2360 a3087c4d7eaac762b9647e90b3f359b5638dc1f2af5bf8df90d6c3d0d8330844.exe 2360 a3087c4d7eaac762b9647e90b3f359b5638dc1f2af5bf8df90d6c3d0d8330844.exe 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
a3087c4d7eaac762b9647e90b3f359b5638dc1f2af5bf8df90d6c3d0d8330844.exepid process 2360 a3087c4d7eaac762b9647e90b3f359b5638dc1f2af5bf8df90d6c3d0d8330844.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1196 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1196 1196 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1196 1196
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3087c4d7eaac762b9647e90b3f359b5638dc1f2af5bf8df90d6c3d0d8330844.exe"C:\Users\Admin\AppData\Local\Temp\a3087c4d7eaac762b9647e90b3f359b5638dc1f2af5bf8df90d6c3d0d8330844.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2360