Analysis
-
max time kernel
90s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 19:21
Static task
static1
Behavioral task
behavioral1
Sample
8c51f9b71b4381a3f4795246db7b77df.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8c51f9b71b4381a3f4795246db7b77df.exe
Resource
win10v2004-20241007-en
General
-
Target
8c51f9b71b4381a3f4795246db7b77df.exe
-
Size
188KB
-
MD5
8c51f9b71b4381a3f4795246db7b77df
-
SHA1
24caf67c8b0edfcf7b9395bfac215a797d2e4a95
-
SHA256
5345f88b858272620a7650f5c12b1e97321d0200db12638c925a5fa0d4f77635
-
SHA512
e8bfd7db8e92af0a04592d9dae9bd18f50b0a21cc6bcc69735b15fa081f4c18aae69193c2c0f48d3b816806b92637a0621702e917aadca18c80958b51764cf4d
-
SSDEEP
3072:ykXlcZPVtaA2LBeBZet7ResfwQs8tf/KZwXdCsI7hdHKqmvTczZ8WWJ:bq1KhLBeBZeOsfwRzWAsI7+qmC8WW
Malware Config
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Program crash 1 IoCs
pid pid_target Process procid_target 2852 2464 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c51f9b71b4381a3f4795246db7b77df.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2852 2464 8c51f9b71b4381a3f4795246db7b77df.exe 30 PID 2464 wrote to memory of 2852 2464 8c51f9b71b4381a3f4795246db7b77df.exe 30 PID 2464 wrote to memory of 2852 2464 8c51f9b71b4381a3f4795246db7b77df.exe 30 PID 2464 wrote to memory of 2852 2464 8c51f9b71b4381a3f4795246db7b77df.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c51f9b71b4381a3f4795246db7b77df.exe"C:\Users\Admin\AppData\Local\Temp\8c51f9b71b4381a3f4795246db7b77df.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2464 -s 1362⤵
- Program crash
PID:2852
-