Analysis
-
max time kernel
15s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27-08-2024 01:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NwFP.exe
Resource
win7-20240704-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
NwFP.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
NwFP.exe
-
Size
469KB
-
MD5
793a58e683a54d24d3c6bae96df29d65
-
SHA1
09e7bdc6a52fa3290fa7e9ee0471c0d1e445a2ce
-
SHA256
80f14f5249c49d21ea607b34fa793d523e03acda8298b1ab1ae8a3d55428c6ce
-
SHA512
f9d6a7d6bdcdfcc3507c55de2e2273e8681f5e8002cffd543bd664064c7e96c35137323f21a742bb00a6cadfc66e06084ddab3ba68207e97cbfa55fc7ec83e42
-
SSDEEP
12288:QvIGc227fgEH/ZnTzlyi3EV/189JhnuYfW9akuz:Ax27Jf9Txye6CJRGDu
Score
10/10
Malware Config
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3008 set thread context of 2696 3008 NwFP.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NwFP.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2696 3008 NwFP.exe 29 PID 3008 wrote to memory of 2696 3008 NwFP.exe 29 PID 3008 wrote to memory of 2696 3008 NwFP.exe 29 PID 3008 wrote to memory of 2696 3008 NwFP.exe 29 PID 3008 wrote to memory of 2696 3008 NwFP.exe 29 PID 3008 wrote to memory of 2696 3008 NwFP.exe 29 PID 3008 wrote to memory of 2696 3008 NwFP.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NwFP.exe"C:\Users\Admin\AppData\Local\Temp\NwFP.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\NwFP.exe"C:\Users\Admin\AppData\Local\Temp\NwFP.exe"2⤵PID:2696
-