Analysis
-
max time kernel
150s -
max time network
64s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
12-10-2022 14:32
Static task
static1
Behavioral task
behavioral1
Sample
16a557d079ac9c060785b7660ff0898a26f28f216e97ed690ad5d1ff40ab3c9b.exe
Resource
win10-20220901-en
windows10-1703-x64
7 signatures
150 seconds
General
-
Target
16a557d079ac9c060785b7660ff0898a26f28f216e97ed690ad5d1ff40ab3c9b.exe
-
Size
295KB
-
MD5
f935e1c897aa983688519dddc115e60b
-
SHA1
a309872ca7c1ecb9d14ae450639d51ef8026e3c0
-
SHA256
16a557d079ac9c060785b7660ff0898a26f28f216e97ed690ad5d1ff40ab3c9b
-
SHA512
cb23c106648c3df3a07d8b9f3751a92a71fb774da07a27ca5183984a2cdbb7222c141717bf11173b03f8c97ccf5906f19279f309828a841577e224ae20d26167
-
SSDEEP
6144:Q5HqU+UykCxG9Gre+5eoL8nqq5VEtzDIxVeigavwVf3:QsUbBCxvre+5eoYqq5MzDuT8
Score
10/10
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/3504-152-0x00000000001E0000-0x00000000001E9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3024 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 16a557d079ac9c060785b7660ff0898a26f28f216e97ed690ad5d1ff40ab3c9b.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 16a557d079ac9c060785b7660ff0898a26f28f216e97ed690ad5d1ff40ab3c9b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 16a557d079ac9c060785b7660ff0898a26f28f216e97ed690ad5d1ff40ab3c9b.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3504 16a557d079ac9c060785b7660ff0898a26f28f216e97ed690ad5d1ff40ab3c9b.exe 3504 16a557d079ac9c060785b7660ff0898a26f28f216e97ed690ad5d1ff40ab3c9b.exe 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3024 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3504 16a557d079ac9c060785b7660ff0898a26f28f216e97ed690ad5d1ff40ab3c9b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\16a557d079ac9c060785b7660ff0898a26f28f216e97ed690ad5d1ff40ab3c9b.exe"C:\Users\Admin\AppData\Local\Temp\16a557d079ac9c060785b7660ff0898a26f28f216e97ed690ad5d1ff40ab3c9b.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3504