Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 01:36
Behavioral task
behavioral1
Sample
9480a889b8c683f9db1b39f004e186337da6eed7c96c61aff2e2c034525399e1_payload.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9480a889b8c683f9db1b39f004e186337da6eed7c96c61aff2e2c034525399e1_payload.exe
Resource
win10v2004-20240419-en
General
-
Target
9480a889b8c683f9db1b39f004e186337da6eed7c96c61aff2e2c034525399e1_payload.exe
-
Size
40KB
-
MD5
4f47f009cc1cfe55b4ba56f5191e3367
-
SHA1
3e7c81076b8252d16f264a1794d2fd90e4132ab4
-
SHA256
7bfa7bde491d5bca80f14118e187dfab173fee1dc9a25138c36af44ea6df246e
-
SHA512
a283dd7a9e92bdd0873614023c94db2c755f6ce7b6b5ef84091c475366d591633d6c5f19140c4aae8bf23279495167815e9eb1e90f607df6d795e8d3107e09ce
-
SSDEEP
768:OS5NnUL52+waG0GX6az52SCIDI0A5aITp1SnhQf:F5NnUNwt0a6a4SCJNSnm
Malware Config
Extracted
smokeloader
pub3
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
9480a889b8c683f9db1b39f004e186337da6eed7c96c61aff2e2c034525399e1_payload.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9480a889b8c683f9db1b39f004e186337da6eed7c96c61aff2e2c034525399e1_payload.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9480a889b8c683f9db1b39f004e186337da6eed7c96c61aff2e2c034525399e1_payload.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9480a889b8c683f9db1b39f004e186337da6eed7c96c61aff2e2c034525399e1_payload.exe