Analysis

  • max time kernel
    150s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2023 20:34

General

  • Target

    file.exe

  • Size

    325KB

  • MD5

    1dff8183014c0d70c0c3aee7adfb8266

  • SHA1

    25ef8938b15abcc1c07cdf4ca292c2919a061f5b

  • SHA256

    8e555a0ab5347106a91b603e9d5d96bf23ba7b6f6fd7e892e9f6f7e4d82dfb61

  • SHA512

    7f17f157a8d22ecaf30318b0ea8d7c2db7c1251e3341938ec82605db16d1a823f9d484003bb5f4263bcf617c08bdba2db49b7adfe15a1ce2b5b31e4f582861bf

  • SSDEEP

    6144:V48hLvUidn8hFwM/bAFbUlwKwpxIwjV6ptCbNKN:V48hjUu8Y+6UleI8

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1576

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1244-59-0x000007FEF5E20000-0x000007FEF5F63000-memory.dmp

    Filesize

    1.3MB

  • memory/1244-60-0x000007FF365A0000-0x000007FF365AA000-memory.dmp

    Filesize

    40KB

  • memory/1576-54-0x0000000075611000-0x0000000075613000-memory.dmp

    Filesize

    8KB

  • memory/1576-55-0x00000000008CC000-0x00000000008E1000-memory.dmp

    Filesize

    84KB

  • memory/1576-56-0x00000000003B0000-0x00000000003B9000-memory.dmp

    Filesize

    36KB

  • memory/1576-57-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/1576-58-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB