Analysis
-
max time kernel
150s -
max time network
75s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
22/11/2022, 11:20
Static task
static1
Behavioral task
behavioral1
Sample
95d1e48f0a9546ceca2c7e20f6be00339470e4c610db69707b1d15716a52e37a.exe
Resource
win10-20220812-en
7 signatures
150 seconds
General
-
Target
95d1e48f0a9546ceca2c7e20f6be00339470e4c610db69707b1d15716a52e37a.exe
-
Size
306KB
-
MD5
7430f308cd858384ec4b1c94160a23b6
-
SHA1
1528fca6cd399c7e89267d8ccc0e88ac9dd939ab
-
SHA256
95d1e48f0a9546ceca2c7e20f6be00339470e4c610db69707b1d15716a52e37a
-
SHA512
5a0c03b7fd0fc77d8f3e837da4bb619428b0b5b384677e51873d91524c4e3ea991ccf121eea42fed01ca1f2b5e0829380a2b91253f1b2abb5f59c36b1f384ddd
-
SSDEEP
6144:N65vu0VPb5Wb/cSx0Jo22tThsIeGjY6x:yukPbcDcSxp22ZVEM
Score
10/10
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/3540-147-0x0000000002030000-0x0000000002039000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 2112 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 95d1e48f0a9546ceca2c7e20f6be00339470e4c610db69707b1d15716a52e37a.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 95d1e48f0a9546ceca2c7e20f6be00339470e4c610db69707b1d15716a52e37a.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 95d1e48f0a9546ceca2c7e20f6be00339470e4c610db69707b1d15716a52e37a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3540 95d1e48f0a9546ceca2c7e20f6be00339470e4c610db69707b1d15716a52e37a.exe 3540 95d1e48f0a9546ceca2c7e20f6be00339470e4c610db69707b1d15716a52e37a.exe 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found 2112 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2112 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3540 95d1e48f0a9546ceca2c7e20f6be00339470e4c610db69707b1d15716a52e37a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\95d1e48f0a9546ceca2c7e20f6be00339470e4c610db69707b1d15716a52e37a.exe"C:\Users\Admin\AppData\Local\Temp\95d1e48f0a9546ceca2c7e20f6be00339470e4c610db69707b1d15716a52e37a.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3540