Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/11/2024, 20:11
Static task
static1
Behavioral task
behavioral1
Sample
bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe
Resource
win10v2004-20241007-en
General
-
Target
bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe
-
Size
214KB
-
MD5
2cea614245de1ec3c3c5fb767acc051d
-
SHA1
bed4c966b25d94c09718f4c70f78cc1edd6a9de4
-
SHA256
b6217af649d93b7f3d6c33adb19441b924e96d0309bf0bcdfa81461f8bf1638d
-
SHA512
38654652ca24ff4c4e548c044b1f854efc9a2b8655cc97bdb6935e6a992b5651bdc8bcdf2edb1025edf1d4ef87c6c0b6325b665e4cfea7cf9d6adad2746fe54d
-
SSDEEP
6144:+5Cav7YAviw2dlUFs2WW7AOB0/cS9X0tJ1:+Uav7YAvnD7DdS9OJ
Malware Config
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2516 set thread context of 2256 2516 bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2256 2516 bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe 31 PID 2516 wrote to memory of 2256 2516 bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe 31 PID 2516 wrote to memory of 2256 2516 bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe 31 PID 2516 wrote to memory of 2256 2516 bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe 31 PID 2516 wrote to memory of 2256 2516 bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe 31 PID 2516 wrote to memory of 2256 2516 bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe 31 PID 2516 wrote to memory of 2256 2516 bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe 31 PID 2516 wrote to memory of 2256 2516 bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe 31 PID 2516 wrote to memory of 2256 2516 bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe"C:\Users\Admin\AppData\Local\Temp\bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2256
-