Analysis
-
max time kernel
12s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
12-12-2022 20:14
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220901-en
General
-
Target
file.exe
-
Size
238KB
-
MD5
968905a62a1aaff517ec51a0f86b06d7
-
SHA1
d2baea0842e6df4f8a1924cc1c1efdd48c24fadb
-
SHA256
65baf6f97e9206c572b743fb7eadc5ddf9adc3fbb5857c73ae2b4b77affc7b72
-
SHA512
aa248fb6a89c216ba93a1c63d07532552874be8ada65674c9b9c606400cac1963ee48e9ae7716e72549c847c4e07db2f13b1011ed4a54ff8fe60bc0ecac94406
-
SSDEEP
3072:7+5WLzpe327C9OJr5qK9pnTqObiFKrpJadvohdBcf0E0OTkRbR8pgX:hLzD7C9Oykpn/iFMp6voyftmcpgX
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1184-57-0x0000000000230000-0x0000000000239000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
file.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
file.exepid process 1184 file.exe 1184 file.exe 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
file.exepid process 1184 file.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1184-54-0x00000000005C8000-0x00000000005D8000-memory.dmpFilesize
64KB
-
memory/1184-55-0x0000000076AE1000-0x0000000076AE3000-memory.dmpFilesize
8KB
-
memory/1184-58-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/1184-57-0x0000000000230000-0x0000000000239000-memory.dmpFilesize
36KB
-
memory/1184-56-0x00000000005C8000-0x00000000005D8000-memory.dmpFilesize
64KB
-
memory/1184-59-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB