Behavioral task
behavioral1
Sample
4272-3-0x0000000000400000-0x000000000040B000-memory.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4272-3-0x0000000000400000-0x000000000040B000-memory.exe
Resource
win10v2004-20240709-en
General
-
Target
4272-3-0x0000000000400000-0x000000000040B000-memory.dmp
-
Size
44KB
-
MD5
9aa2aab1df059af078b58a330416bd39
-
SHA1
f557652314d7be4f39c1496395911280426275ee
-
SHA256
2b69ebe8b5dd2673fe917b8d03dc4cae3da4df44731927fa9bd37941cec4b26b
-
SHA512
cb7506bb63e78b48d83e50407ccc0080f2f4b78a92e3fb9769c6d1df73470955d2cc4b991e6762494b981d0fa455169957e11f910e0725c5ec9369a60b40a224
-
SSDEEP
768:Z/8mWE+vIYxU6DhR8ZSDc28hO3c3VgDeoVZnE:2a+QYq6DhR8658533s
Malware Config
Extracted
smokeloader
pub2
Signatures
-
Smokeloader family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4272-3-0x0000000000400000-0x000000000040B000-memory.dmp
Files
-
4272-3-0x0000000000400000-0x000000000040B000-memory.dmp.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE