Analysis

  • max time kernel
    150s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19-10-2022 11:14

General

  • Target

    edd62022ecde1069e890468d494a635614a1ec82e196bd4750994e4c2f863aee.exe

  • Size

    216KB

  • MD5

    06c40ed6ff6706e599656fd4af0280a0

  • SHA1

    f85b0302cf06983a8dfe9417566845843e24be19

  • SHA256

    edd62022ecde1069e890468d494a635614a1ec82e196bd4750994e4c2f863aee

  • SHA512

    6420daed264db5aba86fe627b410a7100474bc1b77b79f77fa4689709ef760e59341e26052cf8bb4d3cb255b5c6aa545ef36d31d516bd0f2f2d2762e4776a98f

  • SSDEEP

    3072:gLArHwG1mJNNWgKXvVMLBCViGI2uTCFsEuPMrfsv+GQVssRsTM7:gErd4WFGLBHGIssj+GQF

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\edd62022ecde1069e890468d494a635614a1ec82e196bd4750994e4c2f863aee.exe
    "C:\Users\Admin\AppData\Local\Temp\edd62022ecde1069e890468d494a635614a1ec82e196bd4750994e4c2f863aee.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1116

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1116-54-0x00000000006F8000-0x0000000000709000-memory.dmp

    Filesize

    68KB

  • memory/1116-55-0x0000000074D61000-0x0000000074D63000-memory.dmp

    Filesize

    8KB

  • memory/1116-57-0x0000000000220000-0x0000000000229000-memory.dmp

    Filesize

    36KB

  • memory/1116-56-0x00000000006F8000-0x0000000000709000-memory.dmp

    Filesize

    68KB

  • memory/1116-58-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/1116-59-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB