Analysis

  • max time kernel
    150s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2022 00:01

General

  • Target

    file.exe

  • Size

    224KB

  • MD5

    f9a012749b8c926c89dad7c0d200103d

  • SHA1

    df448cf1ef2d1fcd87f1648be000efc22fd239a8

  • SHA256

    b04808b3807c3fcaccf1f7199c3a9237ae596b726af2e9f843789f1566cdd6f5

  • SHA512

    1a34c38e05f4929c3cdb33c514c9ad0eef2b5db4e8d7f5c2e781fec7efa120003670d1d906a3e4e28af32289998c320ab5a13bd9d68834c010045392522797fe

  • SSDEEP

    3072:SmEjJLDcW65Bl0nadghOGp80QF21rKVvQ4TznauDyjG2f/ln:mLDZS0adghzb1rKVv9naMVo

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1784

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1784-54-0x00000000762F1000-0x00000000762F3000-memory.dmp
    Filesize

    8KB

  • memory/1784-55-0x000000000064D000-0x000000000065E000-memory.dmp
    Filesize

    68KB

  • memory/1784-56-0x0000000000220000-0x0000000000229000-memory.dmp
    Filesize

    36KB

  • memory/1784-57-0x0000000000400000-0x000000000045D000-memory.dmp
    Filesize

    372KB

  • memory/1784-58-0x0000000000400000-0x000000000045D000-memory.dmp
    Filesize

    372KB