Analysis
-
max time kernel
149s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
07/01/2023, 07:01
Static task
static1
Behavioral task
behavioral1
Sample
eea2a8fb45dd969242c2bcfb9f612e48.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eea2a8fb45dd969242c2bcfb9f612e48.exe
Resource
win10v2004-20220812-en
General
-
Target
eea2a8fb45dd969242c2bcfb9f612e48.exe
-
Size
307KB
-
MD5
eea2a8fb45dd969242c2bcfb9f612e48
-
SHA1
9059fda6374dd9cea212ef65fb510003a9d4f9da
-
SHA256
9105be62c82726642cca6359284a860739043ba2a80bb363a53cfda8172e9c7f
-
SHA512
5ad1917214bfccb305aaa397856d5a992a7a0d4a132030ec603f775903d9ae714a8e973d49a542fa16d6b58a6d75e778f56577c83cb0a6bfa7233e5a89fde927
-
SSDEEP
3072:uDXhlM4GLHxxjpPrd5nYvGb0OaF2EPyQMyp4Ng0G+AZ3H4Z5KkX5jyLFzi6zSbDL:QIBLHbBEpOa9yQeNbAl45169i6Wb
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/1784-56-0x00000000001B0000-0x00000000001B9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI eea2a8fb45dd969242c2bcfb9f612e48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI eea2a8fb45dd969242c2bcfb9f612e48.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI eea2a8fb45dd969242c2bcfb9f612e48.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1784 eea2a8fb45dd969242c2bcfb9f612e48.exe 1784 eea2a8fb45dd969242c2bcfb9f612e48.exe 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1264 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1784 eea2a8fb45dd969242c2bcfb9f612e48.exe