Analysis

  • max time kernel
    150s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-02-2023 18:12

General

  • Target

    file.exe

  • Size

    321KB

  • MD5

    b8674df862bc7bcde9148deec41a2e27

  • SHA1

    9f289ce888c0c3ca48b8dab7fddf059b61d60fc0

  • SHA256

    43419400b88ca8ca29f759508d3bdef53623bd89f142b74fdcc50f1d8f03dbec

  • SHA512

    9d2afea4c78d0146126683f305969746e584048a2f939c05c084e7adf82e8b8fc6def5847c87b98a3a59fdd3dbfdfc4e791ab4a412f11f9c3616edae68e26fe4

  • SSDEEP

    6144:Ji/LgA70YpDRf8RqplQlQsahuQj9KDs9taMc:Ji/MA/8qpGQs4ljcEta

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:780

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/780-54-0x0000000076121000-0x0000000076123000-memory.dmp
    Filesize

    8KB

  • memory/780-55-0x000000000055C000-0x0000000000571000-memory.dmp
    Filesize

    84KB

  • memory/780-56-0x0000000000220000-0x0000000000229000-memory.dmp
    Filesize

    36KB

  • memory/780-57-0x0000000000400000-0x000000000046C000-memory.dmp
    Filesize

    432KB

  • memory/780-58-0x0000000000400000-0x000000000046C000-memory.dmp
    Filesize

    432KB