Analysis

  • max time kernel
    150s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2022 06:02

General

  • Target

    file.exe

  • Size

    330KB

  • MD5

    f893fb779905b795bd58d0226994c29b

  • SHA1

    6f3d86f4a355ee4539f765ce9022a183d1d19d34

  • SHA256

    8c85584f1fdc8bf428d2110e73b51f05e1d64f29873509e1b8cacc25420f6f2b

  • SHA512

    7398dfee4c6b0940059c9cff703809d99a9b04d1266bc9d46ca00843a6ad8f771fb834414f6c85a343839949694c8d49e3e83fe1c89351422570a47d08aa369c

  • SSDEEP

    6144:ei4GLb3qbWQc3WKFgid+Ow61hJFIJfVAVrwU+:ZL/6bWvGKS6PHgtyQ

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1720

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1720-54-0x0000000075701000-0x0000000075703000-memory.dmp

    Filesize

    8KB

  • memory/1720-55-0x000000000059C000-0x00000000005B1000-memory.dmp

    Filesize

    84KB

  • memory/1720-56-0x0000000000220000-0x0000000000229000-memory.dmp

    Filesize

    36KB

  • memory/1720-57-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/1720-58-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB