smss.exe

  • File Path: C:\Windows\system32\smss.exe
  • Description: Windows Session Manager

Hashes

Type Hash
MD5 2C3F91BB4C0994A7B36ED0B6B14EC9C7
SHA1 53311CBDE782DA05C8EF97D7BC40D768E3A3EA64
SHA256 56AFE5133FDC5806EC6B19436F7B55F1499CFC94619740C171424FBCF7808FD3
SHA384 257ADB455DEF1D45E83DFB1A86167F236097B37EBE567B88E11CDB4E2391695CFDD911DEB64AB13EEF27031FFFEA4AC2
SHA512 B602F69F67095EFC15145A0F477F22420A12564D52BDBA34C9A4134BAA96702C3EE2223932B45F13962796957AEDDB0D431C8C78D0396938C6F9758C94F15A3D
SSDEEP 1536:aQufZPbiE3y7vxRVXONK5OPviHfeS/DXvBADJkyYUfM8Wl20yBJ9js9VVyJPy8:vANbIk+M8rbXvBAkyYUfW25BJN4VuT
IMP 67B500D64F6BDF6FFD6C4F7F4DE9FDA6
PESHA1 B780D2200BDC64B78F5C2EA1BEF8D76CC8E7C7B2
PE256 952BC98F1DC33DD898784C627E7C786EB18C5C00BD748CA23576D857CB3C5C25

Signature

  • Status: Signature verified.
  • Serial: 33000002EC6579AD1E670890130000000002EC
  • Thumbprint: F7C2F2C96A328C13CDA8CDB57B715BDEA2CBD1D9
  • Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
  • Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US

File Metadata

  • Original Filename: smss.exe.mui
  • Product Name: Microsoft Windows Operating System
  • Company Name: Microsoft Corporation
  • File Version: 10.0.19041.1 (WinBuild.160101.0800)
  • Product Version: 10.0.19041.1
  • Language: English (United States)
  • Legal Copyright: Microsoft Corporation. All rights reserved.
  • Machine Type: 64-bit

File Scan

  • VirusTotal Detections: 0/73
  • VirusTotal Link: https://www.virustotal.com/gui/file/56afe5133fdc5806ec6b19436f7b55f1499cfc94619740c171424fbcf7808fd3/detection

Possible Misuse

The following table contains possible examples of smss.exe being misused. While smss.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes.

Source Source File Example License
sigma file_event_win_creation_system_file.yml - '\smss.exe' DRL 1.0
sigma proc_creation_win_abusing_debug_privilege.yml - '\smss.exe' DRL 1.0
sigma proc_creation_win_susp_use_of_sqltoolsps_bin.yml ParentImage\|endswith: '\smss.exe' DRL 1.0
sigma proc_creation_win_susp_use_of_sqltoolsps_bin.yml - Direct PS command execution through SQLToolsPS.exe is uncommon, childprocess sqltoolsps.exe spawned by smss.exe is a legitimate action. DRL 1.0
sigma proc_creation_win_system_exe_anomaly.yml - '\smss.exe' DRL 1.0
malware-ioc nukesped_lazarus .smss.exe``{:.highlight .language-cmhg} © ESET 2014-2018
signature-base generic_anomalies.yar description = “Detects uncommon file size of smss.exe” CC BY-NC 4.0
signature-base generic_anomalies.yar and filename == “smss.exe” CC BY-NC 4.0

MIT License. Copyright (c) 2020-2021 Strontic.