smss.exe

  • File Path: C:\WINDOWS\system32\smss.exe
  • Description: Windows Session Manager

Hashes

Type Hash
MD5 923CD61E4956B830B3BF48A4AFEF04F9
SHA1 608B85299AE70DB8227DC50F9A481BE466A0609F
SHA256 BE09B15C760CD37CCAB1E227CF0CE829E8EFB1C88840E14ED9E48CFCEA1817AB
SHA384 BA819E016D19A76B6D5F064BBDB3AF6668D5E0D3BA0E7E0E1540887C48782B96FC6AF7C13BC50712A8BD7435B1486D11
SHA512 FEC8925F26772FF4E5FABA6508EF25BAD48F5307B50B20E88A2C759094E84D1682B0061048068C5E895CD27A2F30BFA3A51522DF1AC7522DEB833C9D67571082
SSDEEP 3072:ywY6BNeNWHHnEQeT+5+7S93MLISWn2+4uc:ywneNWnnEQeN7S93Mzv
IMP AAFAD421A667D68FFDF602EABF485E02
PESHA1 9AC6A49E617260C2A5EFE883E79356D707438ED6
PE256 92AAC82BB0B4274E89C20AF7A78268077203B69CCFCB086F638D0C31F27D6B59

Signature

  • Status: Signature verified.
  • Serial: 33000002ED2C45E4C145CF48440000000002ED
  • Thumbprint: 312860D2047EB81F8F58C29FF19ECDB4C634CF6A
  • Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
  • Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US

File Metadata

  • Original Filename: smss.exe.mui
  • Product Name: Microsoft Windows Operating System
  • Company Name: Microsoft Corporation
  • File Version: 10.0.22000.1 (WinBuild.160101.0800)
  • Product Version: 10.0.22000.1
  • Language: English (United States)
  • Legal Copyright: Microsoft Corporation. All rights reserved.
  • Machine Type: 64-bit

File Scan

  • VirusTotal Detections: 0/73
  • VirusTotal Link: https://www.virustotal.com/gui/file/be09b15c760cd37ccab1e227cf0ce829e8efb1c88840e14ed9e48cfcea1817ab/detection

Possible Misuse

The following table contains possible examples of smss.exe being misused. While smss.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes.

Source Source File Example License
sigma file_event_win_creation_system_file.yml - '\smss.exe' DRL 1.0
sigma proc_creation_win_abusing_debug_privilege.yml - '\smss.exe' DRL 1.0
sigma proc_creation_win_susp_use_of_sqltoolsps_bin.yml ParentImage\|endswith: '\smss.exe' DRL 1.0
sigma proc_creation_win_susp_use_of_sqltoolsps_bin.yml - Direct PS command execution through SQLToolsPS.exe is uncommon, childprocess sqltoolsps.exe spawned by smss.exe is a legitimate action. DRL 1.0
sigma proc_creation_win_system_exe_anomaly.yml - '\smss.exe' DRL 1.0
malware-ioc nukesped_lazarus .smss.exe``{:.highlight .language-cmhg} © ESET 2014-2018
signature-base generic_anomalies.yar description = “Detects uncommon file size of smss.exe” CC BY-NC 4.0
signature-base generic_anomalies.yar and filename == “smss.exe” CC BY-NC 4.0

MIT License. Copyright (c) 2020-2021 Strontic.