Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
03-04-2024 18:59
Static task
static1
Behavioral task
behavioral1
Sample
083c9a8679034f65137bce38b2f1db98225a8d1f18dc351ee4d5adfc464fa72b.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
083c9a8679034f65137bce38b2f1db98225a8d1f18dc351ee4d5adfc464fa72b.exe
Resource
win10v2004-20240226-en
General
-
Target
083c9a8679034f65137bce38b2f1db98225a8d1f18dc351ee4d5adfc464fa72b.exe
-
Size
267KB
-
MD5
8b2f1a0f480177fe032cbf896442a44e
-
SHA1
96099aced1b2724dd7fc56f6978802b87aeebaab
-
SHA256
083c9a8679034f65137bce38b2f1db98225a8d1f18dc351ee4d5adfc464fa72b
-
SHA512
ca454ca2e172f1ec7d1cf22a2c2a3085692c1ff58a3c37e83cfbbc87623702879b9e2d0fe3a17dd609bcfe5ed5daf9181219ec0f0ecacacaf6136fd1b73758be
-
SSDEEP
3072:8LZMm58BE5RRc8+HBi1/G66Czp+lbWhXrcrB0F0VC2MZUrTTk3:8KEVc8dH6ColYrcrB0F0k2MZmTT
Malware Config
Extracted
smokeloader
pub3
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2052-1-0x0000000000250000-0x0000000000350000-memory.dmpFilesize
1024KB
-
memory/2052-2-0x00000000001B0000-0x00000000001BB000-memory.dmpFilesize
44KB
-
memory/2052-4-0x0000000000400000-0x0000000000AEC000-memory.dmpFilesize
6.9MB
-
memory/2052-5-0x00000000001B0000-0x00000000001BB000-memory.dmpFilesize
44KB