Analysis
-
max time kernel
94s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 07:57
Static task
static1
Behavioral task
behavioral1
Sample
2cea614245de1ec3c3c5fb767acc051d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2cea614245de1ec3c3c5fb767acc051d.exe
Resource
win10v2004-20241007-en
General
-
Target
2cea614245de1ec3c3c5fb767acc051d.exe
-
Size
214KB
-
MD5
2cea614245de1ec3c3c5fb767acc051d
-
SHA1
bed4c966b25d94c09718f4c70f78cc1edd6a9de4
-
SHA256
b6217af649d93b7f3d6c33adb19441b924e96d0309bf0bcdfa81461f8bf1638d
-
SHA512
38654652ca24ff4c4e548c044b1f854efc9a2b8655cc97bdb6935e6a992b5651bdc8bcdf2edb1025edf1d4ef87c6c0b6325b665e4cfea7cf9d6adad2746fe54d
-
SSDEEP
6144:+5Cav7YAviw2dlUFs2WW7AOB0/cS9X0tJ1:+Uav7YAvnD7DdS9OJ
Malware Config
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
2cea614245de1ec3c3c5fb767acc051d.exedescription pid Process procid_target PID 2436 set thread context of 3828 2436 2cea614245de1ec3c3c5fb767acc051d.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2cea614245de1ec3c3c5fb767acc051d.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2cea614245de1ec3c3c5fb767acc051d.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
RegSvcs.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegSvcs.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegSvcs.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegSvcs.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
2cea614245de1ec3c3c5fb767acc051d.exedescription pid Process procid_target PID 2436 wrote to memory of 3828 2436 2cea614245de1ec3c3c5fb767acc051d.exe 84 PID 2436 wrote to memory of 3828 2436 2cea614245de1ec3c3c5fb767acc051d.exe 84 PID 2436 wrote to memory of 3828 2436 2cea614245de1ec3c3c5fb767acc051d.exe 84 PID 2436 wrote to memory of 3828 2436 2cea614245de1ec3c3c5fb767acc051d.exe 84 PID 2436 wrote to memory of 3828 2436 2cea614245de1ec3c3c5fb767acc051d.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cea614245de1ec3c3c5fb767acc051d.exe"C:\Users\Admin\AppData\Local\Temp\2cea614245de1ec3c3c5fb767acc051d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Checks SCSI registry key(s)
PID:3828
-