Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 20:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
676fa6c0b0bf77367c56e1fb47602dd6.exe
Resource
win7-20240903-en
6 signatures
150 seconds
General
-
Target
676fa6c0b0bf77367c56e1fb47602dd6.exe
-
Size
1.2MB
-
MD5
676fa6c0b0bf77367c56e1fb47602dd6
-
SHA1
9f92ddf0ffbdfdeb0b0a13dbf86b919787338dd9
-
SHA256
3a8a23649cd1b6dbd51d7281ded6f78fcc7389af0ecafb649d946160362d5c42
-
SHA512
2208eafa46f3a45d4aaa1b2d12f0be73983f55fccd74f2e251d6618820c36e899476f767739b047b43dc4db897edebf5403a8eba6d4e026408570cb9281c1157
-
SSDEEP
24576:afMj2ySKSGwX8y6tXb46o0B6n6LM0jSENslBY:afqOhhXh76oyiWL2lBY
Malware Config
Extracted
Family
smokeloader
Botnet
bly
Extracted
Family
smokeloader
Botnet
oon1
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1640 created 1152 1640 676fa6c0b0bf77367c56e1fb47602dd6.exe 20 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1640 set thread context of 1740 1640 676fa6c0b0bf77367c56e1fb47602dd6.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 676fa6c0b0bf77367c56e1fb47602dd6.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1740 1640 676fa6c0b0bf77367c56e1fb47602dd6.exe 30 PID 1640 wrote to memory of 1740 1640 676fa6c0b0bf77367c56e1fb47602dd6.exe 30 PID 1640 wrote to memory of 1740 1640 676fa6c0b0bf77367c56e1fb47602dd6.exe 30 PID 1640 wrote to memory of 1740 1640 676fa6c0b0bf77367c56e1fb47602dd6.exe 30 PID 1640 wrote to memory of 1740 1640 676fa6c0b0bf77367c56e1fb47602dd6.exe 30 PID 1640 wrote to memory of 1740 1640 676fa6c0b0bf77367c56e1fb47602dd6.exe 30 PID 1640 wrote to memory of 1740 1640 676fa6c0b0bf77367c56e1fb47602dd6.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\676fa6c0b0bf77367c56e1fb47602dd6.exe"C:\Users\Admin\AppData\Local\Temp\676fa6c0b0bf77367c56e1fb47602dd6.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\676fa6c0b0bf77367c56e1fb47602dd6.exe"C:\Users\Admin\AppData\Local\Temp\676fa6c0b0bf77367c56e1fb47602dd6.exe"2⤵PID:1740
-