Analysis

  • max time kernel
    150s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    25-10-2022 06:27

General

  • Target

    D5BE5A97DAAA1652B2387EEC8B03DD789EC8660517EF2.exe

  • Size

    201KB

  • MD5

    9fa7845c6ecfd795662086b16519eef3

  • SHA1

    dd1a12c6f82bc1c5ec5ffea48477861f871c34db

  • SHA256

    d5be5a97daaa1652b2387eec8b03dd789ec8660517ef2c5fb0253b54f627528a

  • SHA512

    5cbf803c047bb920f3d7dcea5d3de5b76b5ab71e204d368e12426fcc6e8ffd58e08bf2ab2f42d58daeb7267fd2668e2dfd145359b36e6929b5a48f82fe5117ad

  • SSDEEP

    3072:IXwsvbzcAHLfY1odjHkDMLyVI8aQluJ56mCCdNQubb6XVDO8Ugc:cYAHLw1odt2LTuDuKWAbnv

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\D5BE5A97DAAA1652B2387EEC8B03DD789EC8660517EF2.exe
    "C:\Users\Admin\AppData\Local\Temp\D5BE5A97DAAA1652B2387EEC8B03DD789EC8660517EF2.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1228

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1228-54-0x0000000075A11000-0x0000000075A13000-memory.dmp
    Filesize

    8KB

  • memory/1228-55-0x0000000002D3E000-0x0000000002D4E000-memory.dmp
    Filesize

    64KB

  • memory/1228-56-0x0000000000220000-0x0000000000229000-memory.dmp
    Filesize

    36KB

  • memory/1228-57-0x0000000000400000-0x0000000002B7D000-memory.dmp
    Filesize

    39.5MB

  • memory/1228-58-0x0000000000400000-0x0000000002B7D000-memory.dmp
    Filesize

    39.5MB