Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 08:54
Static task
static1
Behavioral task
behavioral1
Sample
build2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
build2.exe
Resource
win10v2004-20240802-en
General
-
Target
build2.exe
-
Size
13KB
-
MD5
a7416a6f5174d4e187a8425fbd03d083
-
SHA1
e3b3571bf5f685e059e4deafda10767e8022b520
-
SHA256
c8bb0b37a1d76c6614cd920da95a14a3abe7a6981306fbfb296b5e18a1c47d0b
-
SHA512
d6255bb0d9c1cdf66a01942b96d9897d1e32ff78a019b52343079ea2f8dff04a79662f3eac687276d63c73fce0cd557b76b1d61ab2bc92badd1fd6a064f38d67
-
SSDEEP
192:vBAlEMZWAY5nCtCY61l40CMvPSohzWLz5xWfgOQ/muu/d5THm4OtkO:JAnLAXNy/m3/bTKkO
Malware Config
Extracted
smokeloader
2017
http://dogewareservice.ru/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum build2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 build2.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2888 2312 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe 712 build2.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 712 build2.exe 712 build2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 712 wrote to memory of 2312 712 build2.exe 87 PID 712 wrote to memory of 2312 712 build2.exe 87 PID 712 wrote to memory of 2312 712 build2.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\build2.exe"C:\Users\Admin\AppData\Local\Temp\build2.exe"1⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 11203⤵
- Program crash
PID:2888
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 2312 -ip 23121⤵PID:4424