Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 08:17
Static task
static1
Behavioral task
behavioral1
Sample
a94fb831fc109410ad30f4f5c2a42e28e60c597c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a94fb831fc109410ad30f4f5c2a42e28e60c597c.exe
Resource
win10v2004-20241007-en
General
-
Target
a94fb831fc109410ad30f4f5c2a42e28e60c597c.exe
-
Size
254KB
-
MD5
ca39093f2380297541833cd06014ec17
-
SHA1
a94fb831fc109410ad30f4f5c2a42e28e60c597c
-
SHA256
936025fe83a4a40518ac5207550f688d25c9ac19525cd93438d79a9ac402d4d4
-
SHA512
ca8e460ba79dad3fecb94aa6afc68fdc318e070e3267d8638ec0f62b1b5b0aff916e9a3b94bb36dfdd596d30a4864be432f84c4887680c8c840d7c946a356b39
-
SSDEEP
6144:jCwnNcLJwBFFe8+hzDS6Q0YAIBq/aGDy:GwSlwBFFe1xDSX0YAyq+
Malware Config
Extracted
smokeloader
oct
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2072 2092 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a94fb831fc109410ad30f4f5c2a42e28e60c597c.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a94fb831fc109410ad30f4f5c2a42e28e60c597c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
a94fb831fc109410ad30f4f5c2a42e28e60c597c.exedescription pid Process procid_target PID 2092 wrote to memory of 2072 2092 a94fb831fc109410ad30f4f5c2a42e28e60c597c.exe 31 PID 2092 wrote to memory of 2072 2092 a94fb831fc109410ad30f4f5c2a42e28e60c597c.exe 31 PID 2092 wrote to memory of 2072 2092 a94fb831fc109410ad30f4f5c2a42e28e60c597c.exe 31 PID 2092 wrote to memory of 2072 2092 a94fb831fc109410ad30f4f5c2a42e28e60c597c.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a94fb831fc109410ad30f4f5c2a42e28e60c597c.exe"C:\Users\Admin\AppData\Local\Temp\a94fb831fc109410ad30f4f5c2a42e28e60c597c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 1402⤵
- Program crash
PID:2072
-