Analysis
-
max time kernel
150s -
max time network
88s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-12-2022 17:34
Static task
static1
Behavioral task
behavioral1
Sample
5022d95f9df8cab8b9ef3f2447a8fbece4469db566bb6bd5670a8684481b680d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5022d95f9df8cab8b9ef3f2447a8fbece4469db566bb6bd5670a8684481b680d.exe
Resource
win10v2004-20221111-en
General
-
Target
5022d95f9df8cab8b9ef3f2447a8fbece4469db566bb6bd5670a8684481b680d.exe
-
Size
307KB
-
MD5
004929ff3e100389624575332e1bf031
-
SHA1
8a081920bdb38fdc34a31fc5654af1cea7b44e20
-
SHA256
5022d95f9df8cab8b9ef3f2447a8fbece4469db566bb6bd5670a8684481b680d
-
SHA512
0ddb2aab9812e4e239b8cd60c2a50546c7881eff9441e8b194e42a4900ad10f29ed77e3b2d007d1af65397659f85d3e353e30b0f19d4e7ed1e1aa388b6509876
-
SSDEEP
6144:gr4dDL4UsLn4jrRtKzE6KA2/YML3FZ0iPvzpQ6rFiaI:g6sUsyuEYs3XxnzpQ6rF
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/740-56-0x0000000000220000-0x0000000000229000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
5022d95f9df8cab8b9ef3f2447a8fbece4469db566bb6bd5670a8684481b680d.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5022d95f9df8cab8b9ef3f2447a8fbece4469db566bb6bd5670a8684481b680d.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5022d95f9df8cab8b9ef3f2447a8fbece4469db566bb6bd5670a8684481b680d.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5022d95f9df8cab8b9ef3f2447a8fbece4469db566bb6bd5670a8684481b680d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5022d95f9df8cab8b9ef3f2447a8fbece4469db566bb6bd5670a8684481b680d.exepid process 740 5022d95f9df8cab8b9ef3f2447a8fbece4469db566bb6bd5670a8684481b680d.exe 740 5022d95f9df8cab8b9ef3f2447a8fbece4469db566bb6bd5670a8684481b680d.exe 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 1392 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
5022d95f9df8cab8b9ef3f2447a8fbece4469db566bb6bd5670a8684481b680d.exepid process 740 5022d95f9df8cab8b9ef3f2447a8fbece4469db566bb6bd5670a8684481b680d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5022d95f9df8cab8b9ef3f2447a8fbece4469db566bb6bd5670a8684481b680d.exe"C:\Users\Admin\AppData\Local\Temp\5022d95f9df8cab8b9ef3f2447a8fbece4469db566bb6bd5670a8684481b680d.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:740