Behavioral task
behavioral1
Sample
3396-1930-0x0000000000400000-0x000000000040A000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3396-1930-0x0000000000400000-0x000000000040A000-memory.exe
Resource
win10v2004-20231215-en
General
-
Target
3396-1930-0x0000000000400000-0x000000000040A000-memory.dmp
-
Size
40KB
-
MD5
2df5e453c4435f64912ef51c4b443fb6
-
SHA1
7e8b428383490d263617a396db15143e1a72a2dd
-
SHA256
50b9a5a1f50bb9fd2a613e8406f8c283ccb246a71f7e843ffac59035f4eadda6
-
SHA512
d2873d136c2509dd649e197a131ceaf6fc54fa00ef91048529a1c88c3db250400b00227821dbba0ec8d64ec52f5e0738d897d5bb5f244d2bcfe235bbd35ce78f
-
SSDEEP
768:3M45SLnsnpEhOB/hAGflc5xOXhr7gvexzv36:3M4ESEhOPNfqStgvexzv3
Malware Config
Signatures
-
Smokeloader family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3396-1930-0x0000000000400000-0x000000000040A000-memory.dmp
Files
-
3396-1930-0x0000000000400000-0x000000000040A000-memory.dmp.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE