Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
23-06-2024 01:03
Behavioral task
behavioral1
Sample
1ab2666172b3ad1123fafce0a407cf1b1cff9f32ef124d431bfa69e921219e38.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1ab2666172b3ad1123fafce0a407cf1b1cff9f32ef124d431bfa69e921219e38.exe
Resource
win10v2004-20240611-en
General
-
Target
1ab2666172b3ad1123fafce0a407cf1b1cff9f32ef124d431bfa69e921219e38.exe
-
Size
40KB
-
MD5
b4aa2b5e8f460a5b2731d538f5f7a0a7
-
SHA1
46084497cdde44312db2c86da72d0e932b4ac169
-
SHA256
1ab2666172b3ad1123fafce0a407cf1b1cff9f32ef124d431bfa69e921219e38
-
SHA512
87e678534d3beef2c65b85b9db5a5742b86439349c3ea9cb4dbd361b0c303ae17f6c7dc243257b39dc5bd3c443ba11f3d1f9e831b071fe07828898cf08a1655f
-
SSDEEP
768:xLtE5GK+qS4tpITHhRx3kwfOX5VAEMiyQjEDlrSlV:fE5Grt48THhRhfOX7AtZDJS/
Malware Config
Extracted
smokeloader
pub1
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
1ab2666172b3ad1123fafce0a407cf1b1cff9f32ef124d431bfa69e921219e38.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1ab2666172b3ad1123fafce0a407cf1b1cff9f32ef124d431bfa69e921219e38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1ab2666172b3ad1123fafce0a407cf1b1cff9f32ef124d431bfa69e921219e38.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1ab2666172b3ad1123fafce0a407cf1b1cff9f32ef124d431bfa69e921219e38.exe