Analysis
-
max time kernel
150s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19-02-2023 17:00
Static task
static1
Behavioral task
behavioral1
Sample
6283f146de9efc701fe73cb8e70dcfdf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6283f146de9efc701fe73cb8e70dcfdf.exe
Resource
win10v2004-20220812-en
General
-
Target
6283f146de9efc701fe73cb8e70dcfdf.exe
-
Size
229KB
-
MD5
6283f146de9efc701fe73cb8e70dcfdf
-
SHA1
54fa717982798b63c01b253d37bc3d3a71806a76
-
SHA256
f2f4ea45f2fc943f867edcff5f7395d9565d951310d74f050c2decbd0ef3a8e0
-
SHA512
0ad4c90c2f34e402e952a90eeeeb4b86e262d3472ecb20698eb3d1484b2a21d204ea9ac81c76a6075e3ee0f0572fd52d1aa92cbb83a7defb95ec4cf6a880c84a
-
SSDEEP
3072:jd9hv6kLh1Ph2mH2ERlxXLeoCsLamLd7k/rc+nMCCVNbV8KukZH8oCEfMRI:Rv6kLx2gRlhzbL5hArc+nUNOKukilEs
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1768-56-0x0000000000220000-0x0000000000229000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
6283f146de9efc701fe73cb8e70dcfdf.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6283f146de9efc701fe73cb8e70dcfdf.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6283f146de9efc701fe73cb8e70dcfdf.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6283f146de9efc701fe73cb8e70dcfdf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6283f146de9efc701fe73cb8e70dcfdf.exepid process 1768 6283f146de9efc701fe73cb8e70dcfdf.exe 1768 6283f146de9efc701fe73cb8e70dcfdf.exe 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1388 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
6283f146de9efc701fe73cb8e70dcfdf.exepid process 1768 6283f146de9efc701fe73cb8e70dcfdf.exe