Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/11/2024, 06:02
Static task
static1
Behavioral task
behavioral1
Sample
5a0522a63ccfff44a25f86d4c4323de8d9431c97.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5a0522a63ccfff44a25f86d4c4323de8d9431c97.exe
Resource
win10v2004-20241007-en
General
-
Target
5a0522a63ccfff44a25f86d4c4323de8d9431c97.exe
-
Size
163KB
-
MD5
f174de14b9a8a787cac955db588f4fd3
-
SHA1
5a0522a63ccfff44a25f86d4c4323de8d9431c97
-
SHA256
4c1b1a11c7d6521e3044416c09271841a5d0276900cc538f3826a497fd72a3a6
-
SHA512
66e983955c0e3fdb74d05c3e615b060990996def08fd272073ae6a917ee0b95bbbc54b4b1ab68917785cea65c3573442d2f8a5c988618aa4a583c099af044722
-
SSDEEP
3072:guFrL5sH1mRilGwYMpuH3HnJcY9fiufxR:NL5sv0fMpuXX9T
Malware Config
Extracted
smokeloader
oct
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Program crash 1 IoCs
pid pid_target Process procid_target 2472 1628 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a0522a63ccfff44a25f86d4c4323de8d9431c97.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2472 1628 5a0522a63ccfff44a25f86d4c4323de8d9431c97.exe 31 PID 1628 wrote to memory of 2472 1628 5a0522a63ccfff44a25f86d4c4323de8d9431c97.exe 31 PID 1628 wrote to memory of 2472 1628 5a0522a63ccfff44a25f86d4c4323de8d9431c97.exe 31 PID 1628 wrote to memory of 2472 1628 5a0522a63ccfff44a25f86d4c4323de8d9431c97.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a0522a63ccfff44a25f86d4c4323de8d9431c97.exe"C:\Users\Admin\AppData\Local\Temp\5a0522a63ccfff44a25f86d4c4323de8d9431c97.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 1362⤵
- Program crash
PID:2472
-