Analysis
-
max time kernel
150s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
09/10/2022, 13:00
Static task
static1
Behavioral task
behavioral1
Sample
e9e7d227f4d95470c0b632b95522c8926e5367f444ac05163ddb135d04d7773e.exe
Resource
win10-20220812-en
7 signatures
150 seconds
General
-
Target
e9e7d227f4d95470c0b632b95522c8926e5367f444ac05163ddb135d04d7773e.exe
-
Size
270KB
-
MD5
efd11a9bee9bca070b4a31af8db91c77
-
SHA1
5924eeaf3329ed517d624cef0f0ac96a3575df68
-
SHA256
e9e7d227f4d95470c0b632b95522c8926e5367f444ac05163ddb135d04d7773e
-
SHA512
d73b3414fffd92db3aa8c21161edf6dd510bab9bc954fce074b79855632b6f748d09c1261d868316c99bf03a47b24bb066339a3e859fdef4ed5ba08ef55fa448
-
SSDEEP
6144:1bLcy7wznz5/NOA43I6CXwzsTrwVfquS:1LMnz5FzBwKd
Score
10/10
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/388-148-0x0000000000530000-0x0000000000539000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3056 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e9e7d227f4d95470c0b632b95522c8926e5367f444ac05163ddb135d04d7773e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e9e7d227f4d95470c0b632b95522c8926e5367f444ac05163ddb135d04d7773e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e9e7d227f4d95470c0b632b95522c8926e5367f444ac05163ddb135d04d7773e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 388 e9e7d227f4d95470c0b632b95522c8926e5367f444ac05163ddb135d04d7773e.exe 388 e9e7d227f4d95470c0b632b95522c8926e5367f444ac05163ddb135d04d7773e.exe 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3056 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 388 e9e7d227f4d95470c0b632b95522c8926e5367f444ac05163ddb135d04d7773e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9e7d227f4d95470c0b632b95522c8926e5367f444ac05163ddb135d04d7773e.exe"C:\Users\Admin\AppData\Local\Temp\e9e7d227f4d95470c0b632b95522c8926e5367f444ac05163ddb135d04d7773e.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:388