Analysis
-
max time kernel
91s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2024 03:58
Behavioral task
behavioral1
Sample
f6307cd6709615693bb8646ad25e234f2669f0fc9739bca4f3f5be3629fd62d7N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6307cd6709615693bb8646ad25e234f2669f0fc9739bca4f3f5be3629fd62d7N.exe
Resource
win10v2004-20240802-en
General
-
Target
f6307cd6709615693bb8646ad25e234f2669f0fc9739bca4f3f5be3629fd62d7N.exe
-
Size
30KB
-
MD5
0a16eaadd24c6a1ff27bb71c6c618d20
-
SHA1
8edfcfe7a157e94eaa4461d6e0a6ea6b6c943b57
-
SHA256
f6307cd6709615693bb8646ad25e234f2669f0fc9739bca4f3f5be3629fd62d7
-
SHA512
1be22b1fec04c2ac43d4f1d78e783af5a972160d5e42bc370ff92f92937374e0f1b93a6f9961e5dcffd5876dc1c6c9a2dd6fa46042ed7d906cc23e1e9580d1e5
-
SSDEEP
768:No0eDWcmheEz/h4r4Pyuh6mUiY4kojCVnkaN+qSmU:No0ehfG/44lNU4koGnko
Malware Config
Extracted
smokeloader
pub4
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6307cd6709615693bb8646ad25e234f2669f0fc9739bca4f3f5be3629fd62d7N.exe