Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 12:18
Static task
static1
Behavioral task
behavioral1
Sample
13d42aae1b958ec21001e80e6dacdfc0bfbdb6fb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
13d42aae1b958ec21001e80e6dacdfc0bfbdb6fb.exe
Resource
win10v2004-20241007-en
General
-
Target
13d42aae1b958ec21001e80e6dacdfc0bfbdb6fb.exe
-
Size
247KB
-
MD5
6c042197a80ce0da58481c59094c1be7
-
SHA1
13d42aae1b958ec21001e80e6dacdfc0bfbdb6fb
-
SHA256
0ce2b7d0bb3ee780c536730d176d598a618f0c2540aa0afe2d1ca7aac0a69a1c
-
SHA512
df6d162d779fcd74746be2754c422b557ff91df438985bb528d6b4de6dbcc499452bfd9a1946525b511769af250a750b53e5e32fe435065a51a898c5c3ec51de
-
SSDEEP
3072:DCMXfLppoI+frr1LMEak3qXfGVtbktwU6b/BP:+ClL+frrvakufGVxkiU2
Malware Config
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2720 1316 WerFault.exe 13d42aae1b958ec21001e80e6dacdfc0bfbdb6fb.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
13d42aae1b958ec21001e80e6dacdfc0bfbdb6fb.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13d42aae1b958ec21001e80e6dacdfc0bfbdb6fb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
13d42aae1b958ec21001e80e6dacdfc0bfbdb6fb.exedescription pid process target process PID 1316 wrote to memory of 2720 1316 13d42aae1b958ec21001e80e6dacdfc0bfbdb6fb.exe WerFault.exe PID 1316 wrote to memory of 2720 1316 13d42aae1b958ec21001e80e6dacdfc0bfbdb6fb.exe WerFault.exe PID 1316 wrote to memory of 2720 1316 13d42aae1b958ec21001e80e6dacdfc0bfbdb6fb.exe WerFault.exe PID 1316 wrote to memory of 2720 1316 13d42aae1b958ec21001e80e6dacdfc0bfbdb6fb.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13d42aae1b958ec21001e80e6dacdfc0bfbdb6fb.exe"C:\Users\Admin\AppData\Local\Temp\13d42aae1b958ec21001e80e6dacdfc0bfbdb6fb.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 1402⤵
- Program crash
PID:2720
-