Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-05-2024 15:35
Static task
static1
Behavioral task
behavioral1
Sample
7d5961b64d45bd62968eca15f2811c7aa1df243dcc57e5aafdf4de2f4f47c9c3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
7d5961b64d45bd62968eca15f2811c7aa1df243dcc57e5aafdf4de2f4f47c9c3.exe
Resource
win11-20240426-en
General
-
Target
7d5961b64d45bd62968eca15f2811c7aa1df243dcc57e5aafdf4de2f4f47c9c3.exe
-
Size
241KB
-
MD5
3ff8b168b8a7f04d48afb6972d7732a0
-
SHA1
7d912a7b220f440b32a6847c7fd2ed5897b56a5d
-
SHA256
7d5961b64d45bd62968eca15f2811c7aa1df243dcc57e5aafdf4de2f4f47c9c3
-
SHA512
7175e2e202ec82ec740c679285e5a6b1bd86c9c6717a6d0e112c122ed2a901027b57fda71d83438e00763a3374b01f9b48b24df23b894c0f8bc7dd78dd7ea169
-
SSDEEP
1536:IM8WdGb6f+kqO2UbXhk0LkQ2a8MOFP7kkW3o7QdQpRTc3kSrjo6Z8oXrNh5ry/IY:tJQ9/0Mnl7kxo3Lw0nobD5ryu95Luj/
Malware Config
Extracted
smokeloader
pub1
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4668 4284 WerFault.exe 7d5961b64d45bd62968eca15f2811c7aa1df243dcc57e5aafdf4de2f4f47c9c3.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
7d5961b64d45bd62968eca15f2811c7aa1df243dcc57e5aafdf4de2f4f47c9c3.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7d5961b64d45bd62968eca15f2811c7aa1df243dcc57e5aafdf4de2f4f47c9c3.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7d5961b64d45bd62968eca15f2811c7aa1df243dcc57e5aafdf4de2f4f47c9c3.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7d5961b64d45bd62968eca15f2811c7aa1df243dcc57e5aafdf4de2f4f47c9c3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d5961b64d45bd62968eca15f2811c7aa1df243dcc57e5aafdf4de2f4f47c9c3.exe"C:\Users\Admin\AppData\Local\Temp\7d5961b64d45bd62968eca15f2811c7aa1df243dcc57e5aafdf4de2f4f47c9c3.exe"1⤵
- Checks SCSI registry key(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 3842⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4284 -ip 42841⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4284-3-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/4284-2-0x00000000020D0000-0x00000000020DB000-memory.dmpFilesize
44KB
-
memory/4284-1-0x0000000002180000-0x0000000002280000-memory.dmpFilesize
1024KB
-
memory/4284-4-0x0000000000400000-0x0000000001F88000-memory.dmpFilesize
27.5MB