Analysis

  • max time kernel
    151s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    31/10/2022, 20:35

General

  • Target

    file.exe

  • Size

    211KB

  • MD5

    2ceb93cbd76e7465bf68555e54d9d718

  • SHA1

    fc00e5e40b17a7f944351c519ce43c3c6b415f63

  • SHA256

    882d21caaa936533ad9de2efcbb7ad5a1bac01af755eb88c2e50d8c4a522eb06

  • SHA512

    05e761908c143166567443f070488e1a409c2ad1628eca988e378fec39e88b2530b72874540dcf3888d8a01c4e075d42bdcfdfcb84cbb37cf87151c34868704c

  • SSDEEP

    3072:OdwqG36Edor3SqQsVIL6BkDH6zf5ptiGR4kK2Bk/l6Yq/VWx:OdN7Eqr3lQs2L+sHINK2K/Dq/g

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1716

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1716-54-0x0000000076041000-0x0000000076043000-memory.dmp

          Filesize

          8KB

        • memory/1716-56-0x0000000000220000-0x0000000000229000-memory.dmp

          Filesize

          36KB

        • memory/1716-55-0x000000000073B000-0x000000000074C000-memory.dmp

          Filesize

          68KB

        • memory/1716-57-0x0000000000400000-0x0000000000598000-memory.dmp

          Filesize

          1.6MB

        • memory/1716-58-0x0000000000400000-0x0000000000598000-memory.dmp

          Filesize

          1.6MB