Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/06/2024, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
764fb938f251aaf3501cdd361fa140fad3d0ffe23301e779052f49d713acedde.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
764fb938f251aaf3501cdd361fa140fad3d0ffe23301e779052f49d713acedde.exe
Resource
win11-20240508-en
General
-
Target
764fb938f251aaf3501cdd361fa140fad3d0ffe23301e779052f49d713acedde.exe
-
Size
322KB
-
MD5
a9509f59b583ba85c684b5dfae3b5a57
-
SHA1
831f0924d426ed713aa51aaddb09acfc98f0b594
-
SHA256
764fb938f251aaf3501cdd361fa140fad3d0ffe23301e779052f49d713acedde
-
SHA512
5c43657c71f67d8df3e399378c492952d9c492faa10c0a54b28d97f84abef8b95ba807501fb6ca2b9002d67b93204cdf0f834d35f48d5dcf6b7c6e0ecc5f945e
-
SSDEEP
3072:j5gL13mjAf7Rv6sGr2+B0zNycm5hEt4LtHF1Ek1EJxTEqS:jCLFmjWdvYrrBn/08bNH
Malware Config
Extracted
smokeloader
pub3
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1564 236 WerFault.exe 77 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 764fb938f251aaf3501cdd361fa140fad3d0ffe23301e779052f49d713acedde.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 764fb938f251aaf3501cdd361fa140fad3d0ffe23301e779052f49d713acedde.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 764fb938f251aaf3501cdd361fa140fad3d0ffe23301e779052f49d713acedde.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\764fb938f251aaf3501cdd361fa140fad3d0ffe23301e779052f49d713acedde.exe"C:\Users\Admin\AppData\Local\Temp\764fb938f251aaf3501cdd361fa140fad3d0ffe23301e779052f49d713acedde.exe"1⤵
- Checks SCSI registry key(s)
PID:236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 236 -s 4842⤵
- Program crash
PID:1564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 236 -ip 2361⤵PID:764