Analysis
-
max time kernel
150s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-12-2022 09:32
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
221KB
-
MD5
0832c102331af5307c561a5dba7380a5
-
SHA1
e5ad2eecf7dab71f9d55a28e9594d78d10dbfbbf
-
SHA256
486624a5f6154e96cf6ffdf8e52101e07527bd6488ccbc2f5af860e1d080ce3d
-
SHA512
d7de631a3cd107366a6536af0f3c20a8cfff24fc8a5d0803ff818e9091095738eeaa171a14317e352b528c801b51f607747fe667f7ec0b813ad333fce5024e46
-
SSDEEP
6144:ZCLKRHtwBivIQHzYgtsRvMlGJ/X1hGymI:ZCgt5HjcvM4VXlm
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1784-56-0x0000000000230000-0x0000000000239000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
file.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
file.exepid process 1784 file.exe 1784 file.exe 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1268 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
file.exepid process 1784 file.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1268-59-0x000007FEF6C90000-0x000007FEF6DD3000-memory.dmpFilesize
1.3MB
-
memory/1268-60-0x000007FF28FB0000-0x000007FF28FBA000-memory.dmpFilesize
40KB
-
memory/1784-54-0x00000000767F1000-0x00000000767F3000-memory.dmpFilesize
8KB
-
memory/1784-55-0x000000000058D000-0x000000000059E000-memory.dmpFilesize
68KB
-
memory/1784-56-0x0000000000230000-0x0000000000239000-memory.dmpFilesize
36KB
-
memory/1784-57-0x0000000000400000-0x000000000045C000-memory.dmpFilesize
368KB
-
memory/1784-58-0x0000000000400000-0x000000000045C000-memory.dmpFilesize
368KB