Analysis
-
max time kernel
158s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 07:10
Static task
static1
Behavioral task
behavioral1
Sample
c166b490846d441400727765dd668262087642bae1bbfd7aaf7a1bed5aa35b62.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
c166b490846d441400727765dd668262087642bae1bbfd7aaf7a1bed5aa35b62.exe
Resource
win11-20240426-en
General
-
Target
c166b490846d441400727765dd668262087642bae1bbfd7aaf7a1bed5aa35b62.exe
-
Size
234KB
-
MD5
73ddf9a7f42e0452b6aa00f4e0a0afd5
-
SHA1
79ea2d473e72751803c9650ae5c6b144a0aa4879
-
SHA256
c166b490846d441400727765dd668262087642bae1bbfd7aaf7a1bed5aa35b62
-
SHA512
c7931368fffeb684c6de5a7affe168f11c1e1d5fed5f843fb0ff98f393c49909e202fb7d500f126097f5e5ddf69beb1fe900c27bd918c2d8d4a69c451b053ed5
-
SSDEEP
3072:a5My9dAbFfJ30bYKMy+WlmKwkGLVmWDju8Ogxsqtoe8MGRT8:UUbFfJEb7LM5t9OgfdaRT
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://dbfhns.in/tmp/index.php
http://guteyr.cc/tmp/index.php
http://greendag.ru/tmp/index.php
http://lobulraualov.in.net/tmp/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 3332 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
c166b490846d441400727765dd668262087642bae1bbfd7aaf7a1bed5aa35b62.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c166b490846d441400727765dd668262087642bae1bbfd7aaf7a1bed5aa35b62.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c166b490846d441400727765dd668262087642bae1bbfd7aaf7a1bed5aa35b62.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c166b490846d441400727765dd668262087642bae1bbfd7aaf7a1bed5aa35b62.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
c166b490846d441400727765dd668262087642bae1bbfd7aaf7a1bed5aa35b62.exepid process 1496 c166b490846d441400727765dd668262087642bae1bbfd7aaf7a1bed5aa35b62.exe 1496 c166b490846d441400727765dd668262087642bae1bbfd7aaf7a1bed5aa35b62.exe 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 3332 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
c166b490846d441400727765dd668262087642bae1bbfd7aaf7a1bed5aa35b62.exepid process 1496 c166b490846d441400727765dd668262087642bae1bbfd7aaf7a1bed5aa35b62.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c166b490846d441400727765dd668262087642bae1bbfd7aaf7a1bed5aa35b62.exe"C:\Users\Admin\AppData\Local\Temp\c166b490846d441400727765dd668262087642bae1bbfd7aaf7a1bed5aa35b62.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1496
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4136 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:3892