Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/10/2022, 07:01

General

  • Target

    file.exe

  • Size

    146KB

  • MD5

    388c7aa91556f342dac1ec505201674b

  • SHA1

    d585fd0f7edddb89565dad9fe0788788588151d7

  • SHA256

    ab6c7a79e5349bf7a41ece9b0616086c8ca6ef2feab0a0c08cd6283c7cb2f017

  • SHA512

    2050715840518d3dc282f273fa764bd498ad3597d144ff262673f285131da753599ce418f67a33e78662724cc6bc2476af805bf315bc3e7267ad3caaec2d5b74

  • SSDEEP

    3072:dI2MyC++Oy8CLxpFM1xhiwOIrfiXXTQ8gQJ4I/O:2UcJxpwKuOnTQ8gBI/

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4664-133-0x0000000000740000-0x0000000000749000-memory.dmp

    Filesize

    36KB

  • memory/4664-132-0x000000000062D000-0x000000000063E000-memory.dmp

    Filesize

    68KB

  • memory/4664-134-0x0000000000400000-0x0000000000581000-memory.dmp

    Filesize

    1.5MB

  • memory/4664-135-0x0000000000400000-0x0000000000581000-memory.dmp

    Filesize

    1.5MB