Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 15:56
Static task
static1
Behavioral task
behavioral1
Sample
5cd007299d861abf099e7868433eefd6952a1c35.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5cd007299d861abf099e7868433eefd6952a1c35.exe
Resource
win10v2004-20241007-en
General
-
Target
5cd007299d861abf099e7868433eefd6952a1c35.exe
-
Size
243KB
-
MD5
79990cfc7277e9c5fdd1a6cd2f640fbc
-
SHA1
5cd007299d861abf099e7868433eefd6952a1c35
-
SHA256
2d5f679ad44a8e32942c31751b87a833faf3fdaf3a16aab3f400e3bd900b5fa8
-
SHA512
749c3b7ea38ddc45fb08471c020fea52d3a6ddbf9b4d28e995d3a924e8e3392f229bdf9ed161b872d5fe0759f4132b04ba08158867f8d6dd09e3a8ac197131b7
-
SSDEEP
3072:RXCSc5SO9LZPOSgUVD5LAWh4Xrz84Ccbe91LFrD8iXcyOI5H/IPRQSb:1T+VLbgUV1AWh4X84YTFf8iMm+R5
Malware Config
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2772 816 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
5cd007299d861abf099e7868433eefd6952a1c35.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5cd007299d861abf099e7868433eefd6952a1c35.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
5cd007299d861abf099e7868433eefd6952a1c35.exedescription pid Process procid_target PID 816 wrote to memory of 2772 816 5cd007299d861abf099e7868433eefd6952a1c35.exe 31 PID 816 wrote to memory of 2772 816 5cd007299d861abf099e7868433eefd6952a1c35.exe 31 PID 816 wrote to memory of 2772 816 5cd007299d861abf099e7868433eefd6952a1c35.exe 31 PID 816 wrote to memory of 2772 816 5cd007299d861abf099e7868433eefd6952a1c35.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cd007299d861abf099e7868433eefd6952a1c35.exe"C:\Users\Admin\AppData\Local\Temp\5cd007299d861abf099e7868433eefd6952a1c35.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 816 -s 1402⤵
- Program crash
PID:2772
-