Analysis
-
max time kernel
150s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-12-2022 17:35
Static task
static1
Behavioral task
behavioral1
Sample
048005548f4ff156c8a9cee922435c214e24b7a772106c8e840e36edf7776bf2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
048005548f4ff156c8a9cee922435c214e24b7a772106c8e840e36edf7776bf2.exe
Resource
win10v2004-20221111-en
General
-
Target
048005548f4ff156c8a9cee922435c214e24b7a772106c8e840e36edf7776bf2.exe
-
Size
230KB
-
MD5
86a1badfd643c574eb49a7e16e541292
-
SHA1
d28c39dde6d6b4ce9bfc4c7f505bc8d02b781852
-
SHA256
048005548f4ff156c8a9cee922435c214e24b7a772106c8e840e36edf7776bf2
-
SHA512
b317a066342c9aaac02f26848ccc2812248491e7ce2ab3fdfc87e3be547ca2eb33f884f63960f10fd4f4780b52cc17766323784203210c30a0872a71cf00cff5
-
SSDEEP
3072:Uh0RMLL2p5PxGbqqwBuYAwVZPYsecXjLptl1A+V+Y700:uLKd57B7LRtTH4+Vl7l
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/2044-56-0x0000000000230000-0x0000000000239000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 048005548f4ff156c8a9cee922435c214e24b7a772106c8e840e36edf7776bf2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 048005548f4ff156c8a9cee922435c214e24b7a772106c8e840e36edf7776bf2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 048005548f4ff156c8a9cee922435c214e24b7a772106c8e840e36edf7776bf2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2044 048005548f4ff156c8a9cee922435c214e24b7a772106c8e840e36edf7776bf2.exe 2044 048005548f4ff156c8a9cee922435c214e24b7a772106c8e840e36edf7776bf2.exe 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1268 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2044 048005548f4ff156c8a9cee922435c214e24b7a772106c8e840e36edf7776bf2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\048005548f4ff156c8a9cee922435c214e24b7a772106c8e840e36edf7776bf2.exe"C:\Users\Admin\AppData\Local\Temp\048005548f4ff156c8a9cee922435c214e24b7a772106c8e840e36edf7776bf2.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2044