Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 09:01
Static task
static1
Behavioral task
behavioral1
Sample
c2b7f86db0bc1c300682d52e2f10b0ee.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c2b7f86db0bc1c300682d52e2f10b0ee.exe
Resource
win10v2004-20241007-en
General
-
Target
c2b7f86db0bc1c300682d52e2f10b0ee.exe
-
Size
231KB
-
MD5
c2b7f86db0bc1c300682d52e2f10b0ee
-
SHA1
689695e9702641f2c692d1cd40d6a0346d9f16a2
-
SHA256
0cd2b14f74d14a98a8f5d3fe6c586316af6c9e6def6d48cfa068fe3247e376ca
-
SHA512
f351fa4c7e870b86ea8f373fa4d944319d228343a2aa3da31c80e338af6635b6e28a8e32dfc6b4f1719d204aeddaa47005b907d8b9da6e79310dcd1d6fa05974
-
SSDEEP
6144:uFYxcvpOCw44okHsJNFnTvCVOZRiHrwVfEz:uFYmv4RokwnnTvCVswf
Malware Config
Extracted
smokeloader
pub2
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Program crash 1 IoCs
pid pid_target Process procid_target 2576 2932 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2b7f86db0bc1c300682d52e2f10b0ee.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2576 2932 c2b7f86db0bc1c300682d52e2f10b0ee.exe 30 PID 2932 wrote to memory of 2576 2932 c2b7f86db0bc1c300682d52e2f10b0ee.exe 30 PID 2932 wrote to memory of 2576 2932 c2b7f86db0bc1c300682d52e2f10b0ee.exe 30 PID 2932 wrote to memory of 2576 2932 c2b7f86db0bc1c300682d52e2f10b0ee.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2b7f86db0bc1c300682d52e2f10b0ee.exe"C:\Users\Admin\AppData\Local\Temp\c2b7f86db0bc1c300682d52e2f10b0ee.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 1402⤵
- Program crash
PID:2576
-