Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 15:05
Behavioral task
behavioral1
Sample
febb01c58274dc2b7127823be1da06a8f9715bcef8c20ef480696d96e0ed7d7b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
febb01c58274dc2b7127823be1da06a8f9715bcef8c20ef480696d96e0ed7d7b.exe
Resource
win10v2004-20240508-en
General
-
Target
febb01c58274dc2b7127823be1da06a8f9715bcef8c20ef480696d96e0ed7d7b.exe
-
Size
40KB
-
MD5
a1dec75a2b2f3c5abdf498a6c7c512c8
-
SHA1
fdb3b8eca89fc351bc9eee84b4489fc9a89452ef
-
SHA256
febb01c58274dc2b7127823be1da06a8f9715bcef8c20ef480696d96e0ed7d7b
-
SHA512
0c9c060083e3064124e49b3c13bcc39a44dac3939e7a4d33525f097c787938dd88aa8b179e8a90ea6fbebe5e243ac9c5412a6c6b9e379ba5ae20306be21afa2e
-
SSDEEP
768:yBQB1CTmqUQHXQkkU3NIZjKQu/MGQ2lsDBw7en:yBc0+yQmNIZreMp28O7Y
Malware Config
Extracted
smokeloader
pub2
Extracted
smokeloader
2022
http://dbfhns.in/tmp/index.php
http://guteyr.cc/tmp/index.php
http://greendag.ru/tmp/index.php
http://lobulraualov.in.net/tmp/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1224 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
febb01c58274dc2b7127823be1da06a8f9715bcef8c20ef480696d96e0ed7d7b.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI febb01c58274dc2b7127823be1da06a8f9715bcef8c20ef480696d96e0ed7d7b.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI febb01c58274dc2b7127823be1da06a8f9715bcef8c20ef480696d96e0ed7d7b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI febb01c58274dc2b7127823be1da06a8f9715bcef8c20ef480696d96e0ed7d7b.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
febb01c58274dc2b7127823be1da06a8f9715bcef8c20ef480696d96e0ed7d7b.exepid process 2224 febb01c58274dc2b7127823be1da06a8f9715bcef8c20ef480696d96e0ed7d7b.exe 2224 febb01c58274dc2b7127823be1da06a8f9715bcef8c20ef480696d96e0ed7d7b.exe 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
febb01c58274dc2b7127823be1da06a8f9715bcef8c20ef480696d96e0ed7d7b.exepid process 2224 febb01c58274dc2b7127823be1da06a8f9715bcef8c20ef480696d96e0ed7d7b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\febb01c58274dc2b7127823be1da06a8f9715bcef8c20ef480696d96e0ed7d7b.exe"C:\Users\Admin\AppData\Local\Temp\febb01c58274dc2b7127823be1da06a8f9715bcef8c20ef480696d96e0ed7d7b.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2224