Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/11/2024, 14:42
Static task
static1
Behavioral task
behavioral1
Sample
19c952a1804767ad97270f59d3a160618ff10efd332a8efd3735cc9770082501.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
19c952a1804767ad97270f59d3a160618ff10efd332a8efd3735cc9770082501.exe
Resource
win10v2004-20241007-en
General
-
Target
19c952a1804767ad97270f59d3a160618ff10efd332a8efd3735cc9770082501.exe
-
Size
237KB
-
MD5
209cf243273e1c853d872190dfd6a8a0
-
SHA1
8b78bea1f98f95afe843ad627ab76e5bb1efba48
-
SHA256
19c952a1804767ad97270f59d3a160618ff10efd332a8efd3735cc9770082501
-
SHA512
65a5e1f18d431a7858f167dc07a3faf7af47ca8817771b5be96feb43c72491e3442fe7bb76c3bebaf6b08971fd68c678ff1e4856cfb5f0962e16fd6de165fe6e
-
SSDEEP
6144:dEUWWTFkSlqyCT0iPdsZfZh9M4CkxW0g8WQElntMM:vFTeSlqyCTHa/h9BFxWhnDh
Malware Config
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1560 set thread context of 3040 1560 19c952a1804767ad97270f59d3a160618ff10efd332a8efd3735cc9770082501.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19c952a1804767ad97270f59d3a160618ff10efd332a8efd3735cc9770082501.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1560 wrote to memory of 3040 1560 19c952a1804767ad97270f59d3a160618ff10efd332a8efd3735cc9770082501.exe 31 PID 1560 wrote to memory of 3040 1560 19c952a1804767ad97270f59d3a160618ff10efd332a8efd3735cc9770082501.exe 31 PID 1560 wrote to memory of 3040 1560 19c952a1804767ad97270f59d3a160618ff10efd332a8efd3735cc9770082501.exe 31 PID 1560 wrote to memory of 3040 1560 19c952a1804767ad97270f59d3a160618ff10efd332a8efd3735cc9770082501.exe 31 PID 1560 wrote to memory of 3040 1560 19c952a1804767ad97270f59d3a160618ff10efd332a8efd3735cc9770082501.exe 31 PID 1560 wrote to memory of 3040 1560 19c952a1804767ad97270f59d3a160618ff10efd332a8efd3735cc9770082501.exe 31 PID 1560 wrote to memory of 3040 1560 19c952a1804767ad97270f59d3a160618ff10efd332a8efd3735cc9770082501.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\19c952a1804767ad97270f59d3a160618ff10efd332a8efd3735cc9770082501.exe"C:\Users\Admin\AppData\Local\Temp\19c952a1804767ad97270f59d3a160618ff10efd332a8efd3735cc9770082501.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\19c952a1804767ad97270f59d3a160618ff10efd332a8efd3735cc9770082501.exe"C:\Users\Admin\AppData\Local\Temp\19c952a1804767ad97270f59d3a160618ff10efd332a8efd3735cc9770082501.exe"2⤵PID:3040
-