Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-09-2024 01:21

General

  • Target

    2c9f66963c780d18d28cfff74c80af587c2d8e3efc7cf5cc92ace0c412e8138a.exe

  • Size

    178KB

  • MD5

    24fde2f8dcad756768d052ce63356058

  • SHA1

    ddc5d43ed9caa6191286faccf9ba7c8aa87cd329

  • SHA256

    2c9f66963c780d18d28cfff74c80af587c2d8e3efc7cf5cc92ace0c412e8138a

  • SHA512

    e942635a1ebaaa8e4e054a114613ab1b31313553373593be89290f45ea2f24f28ed72b3ac1512aa50d9c5b13f40bbcd05680e1195f62399ea7038b79b9560bf0

  • SSDEEP

    3072:yCLTSFLMX6R334jzPw/tzKaFkDI5WMhp:fLTSFC6R3ovMB/rj

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c9f66963c780d18d28cfff74c80af587c2d8e3efc7cf5cc92ace0c412e8138a.exe
    "C:\Users\Admin\AppData\Local\Temp\2c9f66963c780d18d28cfff74c80af587c2d8e3efc7cf5cc92ace0c412e8138a.exe"
    1⤵
      PID:3064

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3064-2-0x00000000005A0000-0x00000000006A0000-memory.dmp

      Filesize

      1024KB

    • memory/3064-4-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/3064-3-0x0000000000220000-0x000000000022B000-memory.dmp

      Filesize

      44KB

    • memory/3064-1-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/3064-5-0x00000000005A0000-0x00000000006A0000-memory.dmp

      Filesize

      1024KB