Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
16-02-2023 20:33
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
253KB
-
MD5
5e4ce5bdab5355fa1ea0c358391568f9
-
SHA1
8b6850eeca5d947cf804180f4ddf516879fbd1e1
-
SHA256
41e684ae9035114b4931514243de31b8a4a9020f22698711fe61ad66bba31255
-
SHA512
aa5dcbf3a5e60c764c795943d785b93258621af860762318b18650dd71d72c5ec7c00c99b379a86c2cb82f12201179509e020575b130a55f24c3b9bc9f48dcc0
-
SSDEEP
3072:w+TpmAL25UG6syPfAETUZDZFFNKO1LFJZhnbxUEuKHhoHPV6Y8Y:XpvL66UETGDZFFf1RPhnbxJhHKHbX
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2008-56-0x0000000000220000-0x0000000000229000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
file.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
file.exepid process 2008 file.exe 2008 file.exe 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 1248 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1248 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
file.exepid process 2008 file.exe