Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 01:01
Static task
static1
Behavioral task
behavioral1
Sample
1cd6d30ac1f36d9de8cbc4f38685aeed80628d47694cb9b199f455855202e7d9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1cd6d30ac1f36d9de8cbc4f38685aeed80628d47694cb9b199f455855202e7d9.exe
Resource
win10v2004-20240508-en
General
-
Target
1cd6d30ac1f36d9de8cbc4f38685aeed80628d47694cb9b199f455855202e7d9.exe
-
Size
267KB
-
MD5
57dcf9e07d0e1c811fa7d1386466d832
-
SHA1
6d5dee42935f4ecff0a10de2c8aacce3ec4f986f
-
SHA256
1cd6d30ac1f36d9de8cbc4f38685aeed80628d47694cb9b199f455855202e7d9
-
SHA512
9aa70a4bf250b4b8309ac170f6b8f7a56ade8c2ee8ac3c8785f49de02809e2612948aefd1e5557b0afab96926d914126386ac12a85c9f9788d4e6445849e6cd7
-
SSDEEP
6144:fhaKS7XKusTiWb8PtdWic0IKxIQ+17LWT:f0B6uVIExIna
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://dbfhns.in/tmp/index.php
http://guteyr.cc/tmp/index.php
http://greendag.ru/tmp/index.php
http://lobulraualov.in.net/tmp/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1088 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1cd6d30ac1f36d9de8cbc4f38685aeed80628d47694cb9b199f455855202e7d9.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1cd6d30ac1f36d9de8cbc4f38685aeed80628d47694cb9b199f455855202e7d9.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1cd6d30ac1f36d9de8cbc4f38685aeed80628d47694cb9b199f455855202e7d9.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2976 1cd6d30ac1f36d9de8cbc4f38685aeed80628d47694cb9b199f455855202e7d9.exe 2976 1cd6d30ac1f36d9de8cbc4f38685aeed80628d47694cb9b199f455855202e7d9.exe 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found 1088 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2976 1cd6d30ac1f36d9de8cbc4f38685aeed80628d47694cb9b199f455855202e7d9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cd6d30ac1f36d9de8cbc4f38685aeed80628d47694cb9b199f455855202e7d9.exe"C:\Users\Admin\AppData\Local\Temp\1cd6d30ac1f36d9de8cbc4f38685aeed80628d47694cb9b199f455855202e7d9.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2976