Analysis
-
max time kernel
150s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-02-2023 07:34
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
windows7-x64
5 signatures
150 seconds
General
-
Target
file.exe
-
Size
284KB
-
MD5
46dfab7095051e939cdd2a42fd936efd
-
SHA1
7fbc4f97338ec85710b1dfb0a2a1aad5be5dac15
-
SHA256
7ea6ef5dfd7b75113822e800f1dcd8bd421a07a853a9a72493e2a700ea7dc572
-
SHA512
b1491644741d89bd593cc9cf540d27b572f2e3f27933a087a6b243d9ef941d92d57b5b937e66e00132a8caa225ad42780330397d4fe526e32125b3500e9311d6
-
SSDEEP
6144:G7eIJALxgebUGVfqE0czzXHO8A4TJvHwP:G7tApUGwE/zz1AAxHU
Score
10/10
Malware Config
Signatures
-
Detects Smokeloader packer 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1976-55-0x0000000000220000-0x0000000000229000-memory.dmp family_smokeloader behavioral1/memory/1976-59-0x0000000000220000-0x0000000000229000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
file.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
file.exepid process 1976 file.exe 1976 file.exe 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
file.exepid process 1976 file.exe