Analysis

  • max time kernel
    151s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    17-11-2022 07:47

General

  • Target

    927da9e354752145ac03a8df25fcaebf.exe

  • Size

    240KB

  • MD5

    927da9e354752145ac03a8df25fcaebf

  • SHA1

    2208f76220af2fc3b0d577c06d1cd7e4a006607f

  • SHA256

    5fc8aac6b5262d938f381f2f3fab4453e7607c3dc665dc1a1220dd73115671c3

  • SHA512

    d56688812f4b1bf99a58259531a0a78927facc9cfa431b4031a692e166f76a434e512712184c40feb0d76975ef420c6392841bf06831481eca7bd25eb3da4129

  • SSDEEP

    6144:ZO1kdLxS/BBu8L0MKfeVOWQX4QQmyxGb:ZOk18BBuvLu9uryA

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\927da9e354752145ac03a8df25fcaebf.exe
    "C:\Users\Admin\AppData\Local\Temp\927da9e354752145ac03a8df25fcaebf.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1368

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1368-54-0x0000000076071000-0x0000000076073000-memory.dmp

    Filesize

    8KB

  • memory/1368-55-0x0000000000A1A000-0x0000000000A2F000-memory.dmp

    Filesize

    84KB

  • memory/1368-56-0x0000000000020000-0x0000000000029000-memory.dmp

    Filesize

    36KB

  • memory/1368-57-0x0000000000400000-0x000000000083F000-memory.dmp

    Filesize

    4.2MB

  • memory/1368-58-0x0000000000400000-0x000000000083F000-memory.dmp

    Filesize

    4.2MB