Analysis
-
max time kernel
150s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
07/01/2023, 09:11
Static task
static1
Behavioral task
behavioral1
Sample
b474d30039b51a5fd11deda319dde90d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b474d30039b51a5fd11deda319dde90d.exe
Resource
win10v2004-20220901-en
General
-
Target
b474d30039b51a5fd11deda319dde90d.exe
-
Size
307KB
-
MD5
b474d30039b51a5fd11deda319dde90d
-
SHA1
0876ca51235b8ee3a2b338c7e73d58cc89a4a416
-
SHA256
3b3ad2db486dc73af2b977d5823f21248bdd533b5b4c8ebfc5f4363feb627ef3
-
SHA512
6e557d0409658f52d4b31ca781567557910dd635de21f4b0be2186d36f022f07490ba3424eb68a49d1f89ffecb0e33dbf50abd4da40a8d8044976999d714b9b3
-
SSDEEP
6144:tdgLi4G31qP+S3Ca/nfg5q0PzC4517Cdggi6Wb:tdgHG31qP+S3JnEz76dji
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/852-56-0x0000000000220000-0x0000000000229000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b474d30039b51a5fd11deda319dde90d.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b474d30039b51a5fd11deda319dde90d.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b474d30039b51a5fd11deda319dde90d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 852 b474d30039b51a5fd11deda319dde90d.exe 852 b474d30039b51a5fd11deda319dde90d.exe 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1244 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 852 b474d30039b51a5fd11deda319dde90d.exe