Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
20-12-2022 09:47
Static task
static1
Behavioral task
behavioral1
Sample
5b37cb232abca4e0345bc66dd7fabd08.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5b37cb232abca4e0345bc66dd7fabd08.exe
Resource
win10v2004-20220812-en
General
-
Target
5b37cb232abca4e0345bc66dd7fabd08.exe
-
Size
304KB
-
MD5
5b37cb232abca4e0345bc66dd7fabd08
-
SHA1
6e233f50b18eb33ae5f27778a84bc90438b51884
-
SHA256
ae9fc18e886fbf5071040cfe4ca2545ba25492c6fc43b9c10dc7c43520e6360c
-
SHA512
7ca16431ff12628287a15adddca81e92992850593d15a25e9f89203957409f286e89cc4fa05758c060ad61647a0242209c04db31458e440d3f03488e53d908b8
-
SSDEEP
6144:EFLxGE756QHbWUtbxlZlqpQP63QZImQKG0:sVGE96QHKUblWpQQQZW
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/872-56-0x0000000000220000-0x0000000000229000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
5b37cb232abca4e0345bc66dd7fabd08.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5b37cb232abca4e0345bc66dd7fabd08.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5b37cb232abca4e0345bc66dd7fabd08.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5b37cb232abca4e0345bc66dd7fabd08.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5b37cb232abca4e0345bc66dd7fabd08.exepid process 872 5b37cb232abca4e0345bc66dd7fabd08.exe 872 5b37cb232abca4e0345bc66dd7fabd08.exe 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1220 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
5b37cb232abca4e0345bc66dd7fabd08.exepid process 872 5b37cb232abca4e0345bc66dd7fabd08.exe