Analysis
-
max time kernel
150s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
20-12-2022 09:49
Static task
static1
Behavioral task
behavioral1
Sample
14d27e8cf4d45d944227148e218dabad.exe
Resource
win7-20221111-en
windows7-x64
6 signatures
150 seconds
General
-
Target
14d27e8cf4d45d944227148e218dabad.exe
-
Size
218KB
-
MD5
14d27e8cf4d45d944227148e218dabad
-
SHA1
64829bacebf8be9d3e16b21b1a607124cb23dc01
-
SHA256
881c03c857c94709c03fcfbd8cf9bfc11b3d1f3579f0198a88e646d62575ee58
-
SHA512
0672d6d2359d1554267cb010900248627eed7e0fe35bdd8e2fa07a3847ed95a89e253d156cc2ca60d93b69336963d54f519762f4cd1b6ef2c87e941f96564971
-
SSDEEP
3072:FTPEC+Lfi8P9RUUBlhxdM/agCEuMRSdso06fWR7b/T7NHCDml:FrF+LK8AUt3rIqxDfWJNCa
Score
10/10
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/1340-56-0x00000000003B0000-0x00000000003B9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 14d27e8cf4d45d944227148e218dabad.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 14d27e8cf4d45d944227148e218dabad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 14d27e8cf4d45d944227148e218dabad.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1340 14d27e8cf4d45d944227148e218dabad.exe 1340 14d27e8cf4d45d944227148e218dabad.exe 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1296 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1340 14d27e8cf4d45d944227148e218dabad.exe