Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 04:17

General

  • Target

    e4be3c4892b6f0b3719a62e8272f2d2d.exe

  • Size

    322KB

  • MD5

    e4be3c4892b6f0b3719a62e8272f2d2d

  • SHA1

    da24fd8e4596ad7e2741da187f1fdad9ad22c9ba

  • SHA256

    b832c506b67eec0abcadfb114d0d0f1bd67a9b5106189e276192ce8344f477a0

  • SHA512

    6f4cf511a93550ff11bf2456c45ec19a82522f5b03d27e039d1253a9f5d8fc0cf7d137387c995fa6bbc727900d44ccc4b1705c38e18ad21f672a28dc6794362c

  • SSDEEP

    3072:effKLkgRFLDRyC9B+Dx+4pYxbw86kvne5X8zPrhY7iiW1nzyDi7u:efCLlRlDUKEvp2bx148z1Y7i9neDi

Malware Config

Extracted

Family

smokeloader

Botnet

pub3

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4be3c4892b6f0b3719a62e8272f2d2d.exe
    "C:\Users\Admin\AppData\Local\Temp\e4be3c4892b6f0b3719a62e8272f2d2d.exe"
    1⤵
      PID:2240

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2240-1-0x0000000002B80000-0x0000000002C80000-memory.dmp

            Filesize

            1024KB

          • memory/2240-2-0x00000000003C0000-0x00000000003CB000-memory.dmp

            Filesize

            44KB

          • memory/2240-3-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2240-6-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2240-5-0x00000000003C0000-0x00000000003CB000-memory.dmp

            Filesize

            44KB

          • memory/2240-4-0x0000000000400000-0x000000000273E000-memory.dmp

            Filesize

            35.2MB