Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 14:56
Static task
static1
Behavioral task
behavioral1
Sample
54b342cab54a66842c75e8061dde646c1ce06247.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
54b342cab54a66842c75e8061dde646c1ce06247.exe
Resource
win10v2004-20241007-en
General
-
Target
54b342cab54a66842c75e8061dde646c1ce06247.exe
-
Size
232KB
-
MD5
f919647759183e07c33e327759c1ea23
-
SHA1
54b342cab54a66842c75e8061dde646c1ce06247
-
SHA256
5dd8b3fb036735240645400bd556f5f85d34e8d863e0c1331b2addd444ec7136
-
SHA512
48464c48278b4c5ce00e576c8e5605bbda054ef93f87b6e2c8c4c4ce476e11866624b9b58b1b1a44c444948d781dd87356ccca3c4e6ad0bba251447b193edd97
-
SSDEEP
3072:LXO2aH7LJU8wQmW/FRL2dfCtQZ85oV0kCt6n/6oPaTJh7vQ1:j7I7LJAQm4R2dDZ8iV0zt6nSMaTP7v
Malware Config
Extracted
smokeloader
oct
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2532 1724 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
54b342cab54a66842c75e8061dde646c1ce06247.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54b342cab54a66842c75e8061dde646c1ce06247.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
54b342cab54a66842c75e8061dde646c1ce06247.exedescription pid Process procid_target PID 1724 wrote to memory of 2532 1724 54b342cab54a66842c75e8061dde646c1ce06247.exe 30 PID 1724 wrote to memory of 2532 1724 54b342cab54a66842c75e8061dde646c1ce06247.exe 30 PID 1724 wrote to memory of 2532 1724 54b342cab54a66842c75e8061dde646c1ce06247.exe 30 PID 1724 wrote to memory of 2532 1724 54b342cab54a66842c75e8061dde646c1ce06247.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\54b342cab54a66842c75e8061dde646c1ce06247.exe"C:\Users\Admin\AppData\Local\Temp\54b342cab54a66842c75e8061dde646c1ce06247.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 1402⤵
- Program crash
PID:2532
-