Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/11/2024, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
85585b606c360fc5118b62c058fa1e997b59261fcbdf18099faf681bdab9051c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
85585b606c360fc5118b62c058fa1e997b59261fcbdf18099faf681bdab9051c.exe
Resource
win10v2004-20241007-en
General
-
Target
85585b606c360fc5118b62c058fa1e997b59261fcbdf18099faf681bdab9051c.exe
-
Size
182KB
-
MD5
e35c38cea86a956040146681c273f0a3
-
SHA1
3bed3aef64e9ed07319d9d31c0d34d37e9793f3c
-
SHA256
85585b606c360fc5118b62c058fa1e997b59261fcbdf18099faf681bdab9051c
-
SHA512
fbde55155efb613b1c1ff4ecb8eb57dc4a09320954c86ea8473a7283e124175ad7d6bbf014e4cc8b5a968729005a687e0ad9be1844ae81efccfface1c652df05
-
SSDEEP
3072:QP19Vaft7dmr4Aat2cQC5Uc6DQr+xYshsZVggjcGkNIVqIe52:M1+mrLAgLQZ/b7ITsqs
Malware Config
Extracted
smokeloader
pub2
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1968 set thread context of 2556 1968 85585b606c360fc5118b62c058fa1e997b59261fcbdf18099faf681bdab9051c.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85585b606c360fc5118b62c058fa1e997b59261fcbdf18099faf681bdab9051c.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2556 1968 85585b606c360fc5118b62c058fa1e997b59261fcbdf18099faf681bdab9051c.exe 31 PID 1968 wrote to memory of 2556 1968 85585b606c360fc5118b62c058fa1e997b59261fcbdf18099faf681bdab9051c.exe 31 PID 1968 wrote to memory of 2556 1968 85585b606c360fc5118b62c058fa1e997b59261fcbdf18099faf681bdab9051c.exe 31 PID 1968 wrote to memory of 2556 1968 85585b606c360fc5118b62c058fa1e997b59261fcbdf18099faf681bdab9051c.exe 31 PID 1968 wrote to memory of 2556 1968 85585b606c360fc5118b62c058fa1e997b59261fcbdf18099faf681bdab9051c.exe 31 PID 1968 wrote to memory of 2556 1968 85585b606c360fc5118b62c058fa1e997b59261fcbdf18099faf681bdab9051c.exe 31 PID 1968 wrote to memory of 2556 1968 85585b606c360fc5118b62c058fa1e997b59261fcbdf18099faf681bdab9051c.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\85585b606c360fc5118b62c058fa1e997b59261fcbdf18099faf681bdab9051c.exe"C:\Users\Admin\AppData\Local\Temp\85585b606c360fc5118b62c058fa1e997b59261fcbdf18099faf681bdab9051c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\85585b606c360fc5118b62c058fa1e997b59261fcbdf18099faf681bdab9051c.exe"C:\Users\Admin\AppData\Local\Temp\85585b606c360fc5118b62c058fa1e997b59261fcbdf18099faf681bdab9051c.exe"2⤵PID:2556
-