Analysis
-
max time kernel
150s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
19-12-2022 19:56
Static task
static1
Behavioral task
behavioral1
Sample
b6e3f01f4942008f68c8649fa24daf9ace975ee9e4e47b50611c87414de12ff5.exe
Resource
win7-20221111-en
General
-
Target
b6e3f01f4942008f68c8649fa24daf9ace975ee9e4e47b50611c87414de12ff5.exe
-
Size
214KB
-
MD5
59299a2e1bb32ca5875b197e7d2d339f
-
SHA1
a081d3d73d8c39bf9049632af2a7a3e8a360165c
-
SHA256
b6e3f01f4942008f68c8649fa24daf9ace975ee9e4e47b50611c87414de12ff5
-
SHA512
51562dc2e31b65ed77c4a404ab325f28e03d673a95079720be9ac1d43234228f16ddb8f0521fbe7980b2aa96051093037e6502b7dcea0e5244e8c16099928626
-
SSDEEP
3072:Y3BWLxxIaRRRdZoQt0nemkBAq2muZGVaNRAtOba+A3+9jcbImdzmuX:YRWLxx5Zx0emc/00nQjcbXF
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1972-56-0x0000000000220000-0x0000000000229000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
b6e3f01f4942008f68c8649fa24daf9ace975ee9e4e47b50611c87414de12ff5.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b6e3f01f4942008f68c8649fa24daf9ace975ee9e4e47b50611c87414de12ff5.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b6e3f01f4942008f68c8649fa24daf9ace975ee9e4e47b50611c87414de12ff5.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b6e3f01f4942008f68c8649fa24daf9ace975ee9e4e47b50611c87414de12ff5.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b6e3f01f4942008f68c8649fa24daf9ace975ee9e4e47b50611c87414de12ff5.exepid process 1972 b6e3f01f4942008f68c8649fa24daf9ace975ee9e4e47b50611c87414de12ff5.exe 1972 b6e3f01f4942008f68c8649fa24daf9ace975ee9e4e47b50611c87414de12ff5.exe 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1212 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
b6e3f01f4942008f68c8649fa24daf9ace975ee9e4e47b50611c87414de12ff5.exepid process 1972 b6e3f01f4942008f68c8649fa24daf9ace975ee9e4e47b50611c87414de12ff5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6e3f01f4942008f68c8649fa24daf9ace975ee9e4e47b50611c87414de12ff5.exe"C:\Users\Admin\AppData\Local\Temp\b6e3f01f4942008f68c8649fa24daf9ace975ee9e4e47b50611c87414de12ff5.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1972