Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2024, 20:11
Static task
static1
Behavioral task
behavioral1
Sample
bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe
Resource
win10v2004-20241007-en
General
-
Target
bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe
-
Size
214KB
-
MD5
2cea614245de1ec3c3c5fb767acc051d
-
SHA1
bed4c966b25d94c09718f4c70f78cc1edd6a9de4
-
SHA256
b6217af649d93b7f3d6c33adb19441b924e96d0309bf0bcdfa81461f8bf1638d
-
SHA512
38654652ca24ff4c4e548c044b1f854efc9a2b8655cc97bdb6935e6a992b5651bdc8bcdf2edb1025edf1d4ef87c6c0b6325b665e4cfea7cf9d6adad2746fe54d
-
SSDEEP
6144:+5Cav7YAviw2dlUFs2WW7AOB0/cS9X0tJ1:+Uav7YAvnD7DdS9OJ
Malware Config
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3748 set thread context of 4464 3748 bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegSvcs.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegSvcs.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3748 wrote to memory of 4464 3748 bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe 87 PID 3748 wrote to memory of 4464 3748 bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe 87 PID 3748 wrote to memory of 4464 3748 bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe 87 PID 3748 wrote to memory of 4464 3748 bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe 87 PID 3748 wrote to memory of 4464 3748 bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe"C:\Users\Admin\AppData\Local\Temp\bed4c966b25d94c09718f4c70f78cc1edd6a9de4.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Checks SCSI registry key(s)
PID:4464
-