Analysis

  • max time kernel
    149s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 16:33

General

  • Target

    51e0c286d021486c952d497dcc78fe87.exe

  • Size

    260KB

  • MD5

    51e0c286d021486c952d497dcc78fe87

  • SHA1

    13ff8a56db4a6445505f35015b50727d163e4592

  • SHA256

    28815400993d7fc9ffd14560291d2a9441effad98ffcd722b7501bf95c44d436

  • SHA512

    7bf579bda867425a63e0c51ac33b5925f3cfc570f8b25888063c11314b1fedf54a9c3ae2a2d9812963a1b4eaa6396e38d6e7d56fa6e6c66c5bf388dfcf969d9b

  • SSDEEP

    3072:4Z/ExBRK6SILh2MA/q5h9fNAcEKmy722YwiZV7EYUB7wz4Qj/KO1pM/h3s:dxBsPILAMpf+bODQ4d724QrKK

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51e0c286d021486c952d497dcc78fe87.exe
    "C:\Users\Admin\AppData\Local\Temp\51e0c286d021486c952d497dcc78fe87.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1752

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1752-54-0x0000000075111000-0x0000000075113000-memory.dmp

          Filesize

          8KB

        • memory/1752-55-0x0000000002E0A000-0x0000000002E1F000-memory.dmp

          Filesize

          84KB

        • memory/1752-56-0x0000000000230000-0x0000000000239000-memory.dmp

          Filesize

          36KB

        • memory/1752-57-0x0000000000400000-0x0000000002C2F000-memory.dmp

          Filesize

          40.2MB

        • memory/1752-58-0x0000000000400000-0x0000000002C2F000-memory.dmp

          Filesize

          40.2MB