Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 14:42
Behavioral task
behavioral1
Sample
f5185d4e070e8cf1120790d078dd9d3dc33539b59c33ffc607d88ee30e3e1dff.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f5185d4e070e8cf1120790d078dd9d3dc33539b59c33ffc607d88ee30e3e1dff.exe
Resource
win10v2004-20240426-en
General
-
Target
f5185d4e070e8cf1120790d078dd9d3dc33539b59c33ffc607d88ee30e3e1dff.exe
-
Size
40KB
-
MD5
311f4f130fad70c7159cbae042926bee
-
SHA1
81e6978bc064c0c745dc6b32bdf05eafeb10fc31
-
SHA256
f5185d4e070e8cf1120790d078dd9d3dc33539b59c33ffc607d88ee30e3e1dff
-
SHA512
21158ed18c489e1e40d5c8e29c079c19231f86a459cdfa11e05176601d93c36b718df03ee125d0d58295618bf65a712884c22a885d2aa2a71028d0d25c3b25d1
-
SSDEEP
768:O2fNN6rUCUQN3rlhRtSEObrfWrZrZZGazbv61kTtnIx1y0qWb:OQNsrII7P7sbrOZXGaXi1kyG0P
Malware Config
Extracted
smokeloader
sel2
Extracted
smokeloader
2022
https://airwide-land.com/calcroom.php
https://summerwaterhall.com/calcroom.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1192 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
f5185d4e070e8cf1120790d078dd9d3dc33539b59c33ffc607d88ee30e3e1dff.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f5185d4e070e8cf1120790d078dd9d3dc33539b59c33ffc607d88ee30e3e1dff.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f5185d4e070e8cf1120790d078dd9d3dc33539b59c33ffc607d88ee30e3e1dff.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f5185d4e070e8cf1120790d078dd9d3dc33539b59c33ffc607d88ee30e3e1dff.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
f5185d4e070e8cf1120790d078dd9d3dc33539b59c33ffc607d88ee30e3e1dff.exepid process 2296 f5185d4e070e8cf1120790d078dd9d3dc33539b59c33ffc607d88ee30e3e1dff.exe 2296 f5185d4e070e8cf1120790d078dd9d3dc33539b59c33ffc607d88ee30e3e1dff.exe 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
f5185d4e070e8cf1120790d078dd9d3dc33539b59c33ffc607d88ee30e3e1dff.exepid process 2296 f5185d4e070e8cf1120790d078dd9d3dc33539b59c33ffc607d88ee30e3e1dff.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1192 1192 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1192 1192
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5185d4e070e8cf1120790d078dd9d3dc33539b59c33ffc607d88ee30e3e1dff.exe"C:\Users\Admin\AppData\Local\Temp\f5185d4e070e8cf1120790d078dd9d3dc33539b59c33ffc607d88ee30e3e1dff.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2296