Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    08/11/2024, 06:30

General

  • Target

    36d71feca4c06834bff8498611e8efa142d25e19de498ee3994ce78e0baa836a.exe

  • Size

    149KB

  • MD5

    1084866d0af1783c18ba3366a4cce613

  • SHA1

    61c8d2948ba4acaf0c7a49acaf896096d2592ae8

  • SHA256

    36d71feca4c06834bff8498611e8efa142d25e19de498ee3994ce78e0baa836a

  • SHA512

    c0f7eb52ce67bc23c7417f33d568cc5be560c9947a0ee3f33840e62350dd232c0a6c37d7c1d0a222524c0275916eceecd0136ef44b0a650ae94ecdf84c9dd4a9

  • SSDEEP

    3072:yxai1itkN1B5waJyJFsHuF5ytw/VFo7NLaMpu:ptkN+SyJFsHu3ytw/VENWM4

Malware Config

Extracted

Family

smokeloader

Botnet

2023

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\36d71feca4c06834bff8498611e8efa142d25e19de498ee3994ce78e0baa836a.exe
    "C:\Users\Admin\AppData\Local\Temp\36d71feca4c06834bff8498611e8efa142d25e19de498ee3994ce78e0baa836a.exe"
    1⤵
      PID:2064

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2064-2-0x0000000000220000-0x0000000000229000-memory.dmp

      Filesize

      36KB

    • memory/2064-1-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2064-3-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2064-4-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2064-6-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2064-5-0x0000000000220000-0x0000000000229000-memory.dmp

      Filesize

      36KB