Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 03:20
Behavioral task
behavioral1
Sample
4160-1722-0x0000000000400000-0x0000000000409000-memory.exe
Resource
win7-20230831-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
4160-1722-0x0000000000400000-0x0000000000409000-memory.exe
Resource
win10v2004-20230915-en
2 signatures
150 seconds
General
-
Target
4160-1722-0x0000000000400000-0x0000000000409000-memory.exe
-
Size
36KB
-
MD5
0a8d783a3ee53604cc043be75fdd169b
-
SHA1
9aa3e835ca3894d46f5e8bc60de659f038c19aad
-
SHA256
d1c5f151e71ae83cf74ca22f6f2194f69cff355a53ad27e4d56776e49d533d54
-
SHA512
0280b25909cbd65e9b410f95545699f4de48c38de715ef4fe90570a9b5fe5cf499bbae970e64fc69558852f887c7560c1b73ad85be1a0ca32c630cfad2f1da7f
-
SSDEEP
768:I5W+OoJWR04fittwvNiJkBaIQMRzYauvtM6WA2:IitR0vttwuk4IPR+VM6W
Score
10/10
Malware Config
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2192 2152 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2192 2152 4160-1722-0x0000000000400000-0x0000000000409000-memory.exe 28 PID 2152 wrote to memory of 2192 2152 4160-1722-0x0000000000400000-0x0000000000409000-memory.exe 28 PID 2152 wrote to memory of 2192 2152 4160-1722-0x0000000000400000-0x0000000000409000-memory.exe 28 PID 2152 wrote to memory of 2192 2152 4160-1722-0x0000000000400000-0x0000000000409000-memory.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4160-1722-0x0000000000400000-0x0000000000409000-memory.exe"C:\Users\Admin\AppData\Local\Temp\4160-1722-0x0000000000400000-0x0000000000409000-memory.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 362⤵
- Program crash
PID:2192
-