Analysis

  • max time kernel
    150s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    08/02/2023, 06:05

General

  • Target

    file.exe

  • Size

    314KB

  • MD5

    2347dcd2205ed4cc0173a598c66a59e6

  • SHA1

    8413e130231d3d1b5b74ced97c68a0d4eda0a3e3

  • SHA256

    01cd57e3acf592cef7173860da12ef878182a1b18a701819756fae54373e0051

  • SHA512

    c9c6e56ac369d2294e76a9460b01c2eec27b774e8f94e221e0d3aff512f1c559ac5e0eafb01102a92cb8473cf36b07621ee2252f839fd8fa3ac751cc5a076f5b

  • SSDEEP

    3072:Iwxjq18KwXR5vhIvbd/mszl/2OpZmEyHKAR8WByUAl10nbBWu:IsWlUv2Td/vxzpZJyqAR8WUjEbIu

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1184

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1184-54-0x00000000767F1000-0x00000000767F3000-memory.dmp

          Filesize

          8KB

        • memory/1184-55-0x000000000064C000-0x0000000000661000-memory.dmp

          Filesize

          84KB

        • memory/1184-56-0x0000000000220000-0x0000000000229000-memory.dmp

          Filesize

          36KB

        • memory/1184-57-0x0000000000400000-0x00000000004CA000-memory.dmp

          Filesize

          808KB

        • memory/1184-58-0x0000000000400000-0x00000000004CA000-memory.dmp

          Filesize

          808KB

        • memory/1268-59-0x000007FEF6C90000-0x000007FEF6DD3000-memory.dmp

          Filesize

          1.3MB

        • memory/1268-60-0x000007FF30FF0000-0x000007FF30FFA000-memory.dmp

          Filesize

          40KB