smss.exe
- File Path:
C:\Windows\system32\smss.exe
- Description: Windows Session Manager
Hashes
Type | Hash |
---|---|
MD5 | 793C887D404F3EE2F9B490C21C38DD80 |
SHA1 | C438640E94CDC3A0037D47B8228A6DA9EA293AF4 |
SHA256 | E11AE324BA8C7AD66869BC34D16594F053C9447F0B11BF8D147DA259AD19DC92 |
SHA384 | 3F2E621E6A84F35B5B86B514FC1201FBC63CC0CA6D5863883CDF3D2549118FDF1E0E26E58D378F4A04CB34E3FB79FEE1 |
SHA512 | ED78C1AA8A106E08F36C71CAB204AF7535371499961FC998459DEDFD75DE318229A9494DFF77A8DE6F3657345ACE39D0EBE7CCF9C3A0FEFCEF61C88F0D5DFF18 |
SSDEEP | 3072:yQePhGRSAkjk9DswG11GIYH23Nh5+cLy4LBNG:yzijkjk9Ir1Gv23Nd+ |
IMP | 9514316F92E1910DDBCE2EA3735D33A5 |
PESHA1 | 12907A129BD9309F39F866D90ED56B50E1D560F5 |
PE256 | 6D57331D6A666AD555B009202277F69F3309C95EA8ECB7F6E3EF0F47436F834E |
Signature
- Status: Signature verified.
- Serial:
3300000266BD1580EFA75CD6D3000000000266
- Thumbprint:
A4341B9FD50FB9964283220A36A1EF6F6FAA7840
- Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
- Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
File Metadata
- Original Filename: smss.exe.mui
- Product Name: Microsoft Windows Operating System
- Company Name: Microsoft Corporation
- File Version: 10.0.19041.1 (WinBuild.160101.0800)
- Product Version: 10.0.19041.1
- Language: English (United States)
- Legal Copyright: Microsoft Corporation. All rights reserved.
- Machine Type: 64-bit
File Scan
- VirusTotal Detections: 0/76
- VirusTotal Link: https://www.virustotal.com/gui/file/e11ae324ba8c7ad66869bc34d16594f053c9447f0b11bf8d147da259ad19dc92/detection
Possible Misuse
The following table contains possible examples of smss.exe
being misused. While smss.exe
is not inherently malicious, its legitimate functionality can be abused for malicious purposes.
Source | Source File | Example | License |
---|---|---|---|
sigma | file_event_win_creation_system_file.yml | - '\smss.exe' |
DRL 1.0 |
sigma | proc_creation_win_abusing_debug_privilege.yml | - '\smss.exe' |
DRL 1.0 |
sigma | proc_creation_win_susp_use_of_sqltoolsps_bin.yml | ParentImage\|endswith: '\smss.exe' |
DRL 1.0 |
sigma | proc_creation_win_susp_use_of_sqltoolsps_bin.yml | - Direct PS command execution through SQLToolsPS.exe is uncommon, childprocess sqltoolsps.exe spawned by smss.exe is a legitimate action. |
DRL 1.0 |
sigma | proc_creation_win_system_exe_anomaly.yml | - '\smss.exe' |
DRL 1.0 |
malware-ioc | nukesped_lazarus | . smss.exe``{:.highlight .language-cmhg} |
© ESET 2014-2018 |
signature-base | generic_anomalies.yar | description = “Detects uncommon file size of smss.exe” | CC BY-NC 4.0 |
signature-base | generic_anomalies.yar | and filename == “smss.exe” | CC BY-NC 4.0 |
MIT License. Copyright (c) 2020-2021 Strontic.