Analysis
-
max time kernel
91s -
max time network
100s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
11-05-2024 14:27
Static task
static1
Behavioral task
behavioral1
Sample
5f82444a28a7f509efe9efa1268053459d14f984821bddccca458746af1c6df8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
5f82444a28a7f509efe9efa1268053459d14f984821bddccca458746af1c6df8.exe
Resource
win11-20240426-en
General
-
Target
5f82444a28a7f509efe9efa1268053459d14f984821bddccca458746af1c6df8.exe
-
Size
245KB
-
MD5
7a935d250ae52e8b79baef8959b49d2a
-
SHA1
bea9f5f91134bd0ad8ba0b5933361bb77e8412a9
-
SHA256
5f82444a28a7f509efe9efa1268053459d14f984821bddccca458746af1c6df8
-
SHA512
182cdcc9b63ab57e9dad0c9eed3541e5264982f9d247b8286eed53ccb0791bca0f63f24df21326c8d4faa7b16f7c2bf793886eb6f04d1fb8bd85fbb92ccde55c
-
SSDEEP
3072:qXk6Xf4Nhxwp1eXk4oF+C17RSyZoa0Zx/nDyym3d1x16rEa+3hA9O/KLTL6:q7v3HBDpSna0Zx/n+dT6p4hA4yLT
Malware Config
Extracted
smokeloader
pub1
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 652 5100 WerFault.exe 5f82444a28a7f509efe9efa1268053459d14f984821bddccca458746af1c6df8.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
5f82444a28a7f509efe9efa1268053459d14f984821bddccca458746af1c6df8.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5f82444a28a7f509efe9efa1268053459d14f984821bddccca458746af1c6df8.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5f82444a28a7f509efe9efa1268053459d14f984821bddccca458746af1c6df8.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5f82444a28a7f509efe9efa1268053459d14f984821bddccca458746af1c6df8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f82444a28a7f509efe9efa1268053459d14f984821bddccca458746af1c6df8.exe"C:\Users\Admin\AppData\Local\Temp\5f82444a28a7f509efe9efa1268053459d14f984821bddccca458746af1c6df8.exe"1⤵
- Checks SCSI registry key(s)
PID:5100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 3842⤵
- Program crash
PID:652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5100 -ip 51001⤵PID:1648