Analysis

  • max time kernel
    136s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-08-2024 07:11

General

  • Target

    80ee873da2eca8b159dad763964e1535.exe

  • Size

    198KB

  • MD5

    80ee873da2eca8b159dad763964e1535

  • SHA1

    94db181c467e74d158edddf4ef248e282a0a719f

  • SHA256

    71b4334b5a947ba785b626bb2e7bad94da7af1efcb1d11b1d860d1bff0249dde

  • SHA512

    8aff3dfe5190e12cd740d9be0de1d6ca331ca6b80766c3112f7befb02d91c5c26d1845d20481f511351ac56733a94346a7fefc339c95e726a8885c60973f139d

  • SSDEEP

    3072:ALPHH9M2PuZaX6gNtLlBdSC2EvASCcM25diY:ALPHH9M2oI6gNtPl2FTY

Malware Config

Extracted

Family

smokeloader

Botnet

pub2

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\80ee873da2eca8b159dad763964e1535.exe
    "C:\Users\Admin\AppData\Local\Temp\80ee873da2eca8b159dad763964e1535.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Checks SCSI registry key(s)
    PID:4372
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4372 -s 368
      2⤵
      • Program crash
      PID:2416
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4372 -ip 4372
    1⤵
      PID:1220
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4344,i,11391966286255097843,10588851088187498028,262144 --variations-seed-version --mojo-platform-channel-handle=4116 /prefetch:8
      1⤵
        PID:2108

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4372-1-0x0000000000470000-0x0000000000570000-memory.dmp

        Filesize

        1024KB

      • memory/4372-3-0x0000000000400000-0x0000000000445000-memory.dmp

        Filesize

        276KB

      • memory/4372-2-0x0000000000400000-0x000000000040B000-memory.dmp

        Filesize

        44KB

      • memory/4372-4-0x0000000000400000-0x0000000000445000-memory.dmp

        Filesize

        276KB

      • memory/4372-5-0x0000000000400000-0x000000000040B000-memory.dmp

        Filesize

        44KB