Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
16-05-2024 15:23
Static task
static1
Behavioral task
behavioral1
Sample
da105eb3f048fa1b375771bee7c486ebcdec2328610f21b7311918c4b7bb43d3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
da105eb3f048fa1b375771bee7c486ebcdec2328610f21b7311918c4b7bb43d3.exe
Resource
win11-20240508-en
General
-
Target
da105eb3f048fa1b375771bee7c486ebcdec2328610f21b7311918c4b7bb43d3.exe
-
Size
228KB
-
MD5
f77e1a55e53d8cd137b390aee9065caf
-
SHA1
a38105fb8bbec353b051c787b4980db538102fbe
-
SHA256
da105eb3f048fa1b375771bee7c486ebcdec2328610f21b7311918c4b7bb43d3
-
SHA512
90ae9050fdd3ee9774f64787dbd57f52fafbdb30d8efdd3bf212db1f3084d468b5585f4e15a7b8898d5c4cc0f1c9e0cca668e64b57eb1bf5747aaa6ca785624d
-
SSDEEP
3072:U/X4PHvHxK40XKv/0+R5e9KYbzEEEEEEEZUTFub4ms1veJb73NWsl3wnd6V0fcak:mnaH0D/EEEEEEEZUNpeJ33N1366OIw
Malware Config
Extracted
smokeloader
pub1
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4440 1544 WerFault.exe da105eb3f048fa1b375771bee7c486ebcdec2328610f21b7311918c4b7bb43d3.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
da105eb3f048fa1b375771bee7c486ebcdec2328610f21b7311918c4b7bb43d3.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI da105eb3f048fa1b375771bee7c486ebcdec2328610f21b7311918c4b7bb43d3.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI da105eb3f048fa1b375771bee7c486ebcdec2328610f21b7311918c4b7bb43d3.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI da105eb3f048fa1b375771bee7c486ebcdec2328610f21b7311918c4b7bb43d3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\da105eb3f048fa1b375771bee7c486ebcdec2328610f21b7311918c4b7bb43d3.exe"C:\Users\Admin\AppData\Local\Temp\da105eb3f048fa1b375771bee7c486ebcdec2328610f21b7311918c4b7bb43d3.exe"1⤵
- Checks SCSI registry key(s)
PID:1544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 2362⤵
- Program crash
PID:4440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1544 -ip 15441⤵PID:3832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1544-1-0x0000000000800000-0x0000000000900000-memory.dmpFilesize
1024KB
-
memory/1544-3-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/1544-2-0x00000000007F0000-0x00000000007FB000-memory.dmpFilesize
44KB
-
memory/1544-4-0x0000000000400000-0x0000000000483000-memory.dmpFilesize
524KB