Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2022 19:05
Static task
static1
Behavioral task
behavioral1
Sample
eb2e5daabfc9bef866c6ac42f0e5d89ce82f3fb7c7bcf60b41a1ed79b51f1317.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
eb2e5daabfc9bef866c6ac42f0e5d89ce82f3fb7c7bcf60b41a1ed79b51f1317.exe
-
Size
307KB
-
MD5
9aeb106dd826254e44ce4144532d60ba
-
SHA1
5e5b089c82a4282baff1ac0fd158b1e3420ee5f8
-
SHA256
eb2e5daabfc9bef866c6ac42f0e5d89ce82f3fb7c7bcf60b41a1ed79b51f1317
-
SHA512
7205b7944f5e1be50f256ca58e881debedb1bf3930ff5a2e5f211f449717d2ab0a48ac1ff6c3246899cdaa3ed287d0a4f3842c56875f7394801d2a5689ad16bf
-
SSDEEP
6144:c7pBjfkIdQZ6Shpj3KKpk3Km9wt+PYE+LScUcOf8Lkw8:c/jc0QZ6El3Npk3Km9u+N+LLOt
Score
10/10
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/3884-133-0x00000000001C0000-0x00000000001C9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI eb2e5daabfc9bef866c6ac42f0e5d89ce82f3fb7c7bcf60b41a1ed79b51f1317.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI eb2e5daabfc9bef866c6ac42f0e5d89ce82f3fb7c7bcf60b41a1ed79b51f1317.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI eb2e5daabfc9bef866c6ac42f0e5d89ce82f3fb7c7bcf60b41a1ed79b51f1317.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3884 eb2e5daabfc9bef866c6ac42f0e5d89ce82f3fb7c7bcf60b41a1ed79b51f1317.exe 3884 eb2e5daabfc9bef866c6ac42f0e5d89ce82f3fb7c7bcf60b41a1ed79b51f1317.exe 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found 3032 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3884 eb2e5daabfc9bef866c6ac42f0e5d89ce82f3fb7c7bcf60b41a1ed79b51f1317.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb2e5daabfc9bef866c6ac42f0e5d89ce82f3fb7c7bcf60b41a1ed79b51f1317.exe"C:\Users\Admin\AppData\Local\Temp\eb2e5daabfc9bef866c6ac42f0e5d89ce82f3fb7c7bcf60b41a1ed79b51f1317.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3884