Analysis

  • max time kernel
    150s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2023 08:35

General

  • Target

    222a4945a6837304d2f7fd06ad87346a.exe

  • Size

    320KB

  • MD5

    222a4945a6837304d2f7fd06ad87346a

  • SHA1

    230616109257111af299168389ea94c622c9d90a

  • SHA256

    4e7715976bd2f7409a107ed08179d8634d072f28082fa6ab7940d4f3d43ccf24

  • SHA512

    56c04e18642ebd182a35981fd2213779d697b8e70804bc0b077d5b050d02bf8e38aef21717792c9374dd893deb76f15b27b8832dbfa487cdb175a26765d0a718

  • SSDEEP

    6144:mHZsK5gXqUfE8gkr1tAVjqzAP3Zi5pyixFzk:GZ5gXxc8gkrTi3Zi/yi8

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\222a4945a6837304d2f7fd06ad87346a.exe
    "C:\Users\Admin\AppData\Local\Temp\222a4945a6837304d2f7fd06ad87346a.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1412

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1412-54-0x0000000075771000-0x0000000075773000-memory.dmp

    Filesize

    8KB

  • memory/1412-56-0x0000000000220000-0x0000000000229000-memory.dmp

    Filesize

    36KB

  • memory/1412-55-0x000000000058D000-0x00000000005A3000-memory.dmp

    Filesize

    88KB

  • memory/1412-57-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/1412-58-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB