Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    27-05-2024 19:29

General

  • Target

    2876-3-0x0000000000400000-0x000000000040B000-memory.exe

  • Size

    44KB

  • MD5

    4aa0b472ec31c405725840b7ba9df614

  • SHA1

    6e977f5e9da3fe9f78c64200b8895f9195876bb2

  • SHA256

    93d63693cbe8d2f7e58d6285db038a0c498de26930db45e9193ae862e1b2174a

  • SHA512

    ece2b527649dea254858b3883a4e723f9a9c18b8803b37c731d2aec889537a5d84dcdfc5ca3ea7c7fe77a1c581a1a42bcbcd9b254c8ccbd53b0d4f1622a51bbd

  • SSDEEP

    768:yRQB1CTSqtoHXQkkU3NIZjKQu/MGQ2lsDBw7en:yRc0/KQmNIZreMp28O7Y

Malware Config

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2876-3-0x0000000000400000-0x000000000040B000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\2876-3-0x0000000000400000-0x000000000040B000-memory.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1832 -s 36
      2⤵
      • Program crash
      PID:1692

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1832-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB