Analysis
-
max time kernel
300s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 23:09
Static task
static1
Behavioral task
behavioral1
Sample
7eab666f0e02ccb8111c74f81d82ee65c4ed0b95107b752709a967a20d4e2ed4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7eab666f0e02ccb8111c74f81d82ee65c4ed0b95107b752709a967a20d4e2ed4.exe
Resource
win10-20240404-en
General
-
Target
7eab666f0e02ccb8111c74f81d82ee65c4ed0b95107b752709a967a20d4e2ed4.exe
-
Size
235KB
-
MD5
87a07c22cc789c5541c350b72aa81ef4
-
SHA1
f77a9dd5f6c1de164006fc88b736ae10a3dd93d9
-
SHA256
7eab666f0e02ccb8111c74f81d82ee65c4ed0b95107b752709a967a20d4e2ed4
-
SHA512
5177cc21e886f257bf17018d1dca69e2162a0fd06a237a36ab27c86f89db36f6df733884d20f388d00974506f75694075d0f525c78398a77a0d3abab5bbe4123
-
SSDEEP
3072:8MyAkioD0OHfQX07YafiSH+E5lC/Utll30fmLJuDv2q0Bf5gfv7T4TbHY:+TsOHfQk7vi0XtL0fmVuD2bgfvAT
Malware Config
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1208 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7eab666f0e02ccb8111c74f81d82ee65c4ed0b95107b752709a967a20d4e2ed4.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7eab666f0e02ccb8111c74f81d82ee65c4ed0b95107b752709a967a20d4e2ed4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7eab666f0e02ccb8111c74f81d82ee65c4ed0b95107b752709a967a20d4e2ed4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3048 7eab666f0e02ccb8111c74f81d82ee65c4ed0b95107b752709a967a20d4e2ed4.exe 3048 7eab666f0e02ccb8111c74f81d82ee65c4ed0b95107b752709a967a20d4e2ed4.exe 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3048 7eab666f0e02ccb8111c74f81d82ee65c4ed0b95107b752709a967a20d4e2ed4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1208 Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\7eab666f0e02ccb8111c74f81d82ee65c4ed0b95107b752709a967a20d4e2ed4.exe"C:\Users\Admin\AppData\Local\Temp\7eab666f0e02ccb8111c74f81d82ee65c4ed0b95107b752709a967a20d4e2ed4.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3048