smss.exe
- File Path:
C:\Windows\system32\smss.exe
- Description: Windows Session Manager
Hashes
Type | Hash |
---|---|
MD5 | DC6C71AB53DA4EBED427DD4F02B16688 |
SHA1 | 9F1F5D7A6DCC64EBE76708BDC494123FE0AC8C5D |
SHA256 | 5C0FAEBCEDE7821DFBCE95ABED8B85BC25E19489EA6CF4D404A54E4E366A5E88 |
SHA384 | B0FDFF876706AB6C60A9E8157D5A1EA7BECC8435B8C12385CBB1B8D1BBE1CD399C6287162B95DA9DD41E46B04FAD7FFB |
SHA512 | 2E707F58B7EC98EF763C9ADDD191920F9BCE7138B1564052B5525C1B2BF5BFEE11BE4C399F60FB02FAA83FFB3A18605C6B81CD66B1B9FC194288A837F74F14D2 |
SSDEEP | 3072:BwufRJRxMXakk9X/QWV1GIhHSXNBJPgUe19fK:BjJWKkk9v71GQSXNj |
IMP | 9514316F92E1910DDBCE2EA3735D33A5 |
PESHA1 | F6D01A79EAF158F2BF3F058FA49B2236DA80BBFF |
PE256 | A5DCAD6865E4CF5FD990AAF407788736F341DE11262C7125DB583AA768D5CE98 |
Signature
- Status: Signature verified.
- Serial:
3300000266BD1580EFA75CD6D3000000000266
- Thumbprint:
A4341B9FD50FB9964283220A36A1EF6F6FAA7840
- Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
- Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
File Metadata
- Original Filename: smss.exe.mui
- Product Name: Microsoft Windows Operating System
- Company Name: Microsoft Corporation
- File Version: 10.0.19041.1 (WinBuild.160101.0800)
- Product Version: 10.0.19041.1
- Language: English (United States)
- Legal Copyright: Microsoft Corporation. All rights reserved.
- Machine Type: 64-bit
File Scan
- VirusTotal Detections: 0/66
- VirusTotal Link: https://www.virustotal.com/gui/file/5c0faebcede7821dfbce95abed8b85bc25e19489ea6cf4d404a54e4e366a5e88/detection/
Possible Misuse
The following table contains possible examples of smss.exe
being misused. While smss.exe
is not inherently malicious, its legitimate functionality can be abused for malicious purposes.
Source | Source File | Example | License |
---|---|---|---|
sigma | file_event_win_creation_system_file.yml | - '\smss.exe' |
DRL 1.0 |
sigma | proc_creation_win_abusing_debug_privilege.yml | - '\smss.exe' |
DRL 1.0 |
sigma | proc_creation_win_susp_use_of_sqltoolsps_bin.yml | ParentImage\|endswith: '\smss.exe' |
DRL 1.0 |
sigma | proc_creation_win_susp_use_of_sqltoolsps_bin.yml | - Direct PS command execution through SQLToolsPS.exe is uncommon, childprocess sqltoolsps.exe spawned by smss.exe is a legitimate action. |
DRL 1.0 |
sigma | proc_creation_win_system_exe_anomaly.yml | - '\smss.exe' |
DRL 1.0 |
malware-ioc | nukesped_lazarus | . smss.exe``{:.highlight .language-cmhg} |
© ESET 2014-2018 |
signature-base | generic_anomalies.yar | description = “Detects uncommon file size of smss.exe” | CC BY-NC 4.0 |
signature-base | generic_anomalies.yar | and filename == “smss.exe” | CC BY-NC 4.0 |
MIT License. Copyright (c) 2020-2021 Strontic.