Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 03:16
Static task
static1
Behavioral task
behavioral1
Sample
569b86219cba20b0c5f808b76026a4fb5ab6dc80.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
569b86219cba20b0c5f808b76026a4fb5ab6dc80.exe
Resource
win10v2004-20241007-en
General
-
Target
569b86219cba20b0c5f808b76026a4fb5ab6dc80.exe
-
Size
211KB
-
MD5
20d9ca599cc0e8e73b77f5552a303637
-
SHA1
569b86219cba20b0c5f808b76026a4fb5ab6dc80
-
SHA256
24d6ba0a22ec78d588e2be35a4451c50620e206b0b542b9f010540e7704bad86
-
SHA512
299dd1b019cd9e80f2e6a527aeccdbdc7ee3251625e33270baab3c7515dfc263421b04c2693cef56afc6d21ef970ff7f60a04d0bf966c220e2cd9836ad60808d
-
SSDEEP
3072:PmoSdUCtu9MUy4xk2Q5Jco4RxJEPSvnARgYzbHOAg0FujDE5wjmaLJDfLG6PfDLC:PmogFu6U3xkxaRHEF+AOzLNDf66XXXC
Malware Config
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
569b86219cba20b0c5f808b76026a4fb5ab6dc80.exedescription pid process target process PID 2552 set thread context of 1832 2552 569b86219cba20b0c5f808b76026a4fb5ab6dc80.exe RegSvcs.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2548 2552 WerFault.exe 569b86219cba20b0c5f808b76026a4fb5ab6dc80.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
569b86219cba20b0c5f808b76026a4fb5ab6dc80.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 569b86219cba20b0c5f808b76026a4fb5ab6dc80.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
569b86219cba20b0c5f808b76026a4fb5ab6dc80.exedescription pid process target process PID 2552 wrote to memory of 1832 2552 569b86219cba20b0c5f808b76026a4fb5ab6dc80.exe RegSvcs.exe PID 2552 wrote to memory of 1832 2552 569b86219cba20b0c5f808b76026a4fb5ab6dc80.exe RegSvcs.exe PID 2552 wrote to memory of 1832 2552 569b86219cba20b0c5f808b76026a4fb5ab6dc80.exe RegSvcs.exe PID 2552 wrote to memory of 1832 2552 569b86219cba20b0c5f808b76026a4fb5ab6dc80.exe RegSvcs.exe PID 2552 wrote to memory of 1832 2552 569b86219cba20b0c5f808b76026a4fb5ab6dc80.exe RegSvcs.exe PID 2552 wrote to memory of 1832 2552 569b86219cba20b0c5f808b76026a4fb5ab6dc80.exe RegSvcs.exe PID 2552 wrote to memory of 1832 2552 569b86219cba20b0c5f808b76026a4fb5ab6dc80.exe RegSvcs.exe PID 2552 wrote to memory of 1832 2552 569b86219cba20b0c5f808b76026a4fb5ab6dc80.exe RegSvcs.exe PID 2552 wrote to memory of 1832 2552 569b86219cba20b0c5f808b76026a4fb5ab6dc80.exe RegSvcs.exe PID 2552 wrote to memory of 2548 2552 569b86219cba20b0c5f808b76026a4fb5ab6dc80.exe WerFault.exe PID 2552 wrote to memory of 2548 2552 569b86219cba20b0c5f808b76026a4fb5ab6dc80.exe WerFault.exe PID 2552 wrote to memory of 2548 2552 569b86219cba20b0c5f808b76026a4fb5ab6dc80.exe WerFault.exe PID 2552 wrote to memory of 2548 2552 569b86219cba20b0c5f808b76026a4fb5ab6dc80.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\569b86219cba20b0c5f808b76026a4fb5ab6dc80.exe"C:\Users\Admin\AppData\Local\Temp\569b86219cba20b0c5f808b76026a4fb5ab6dc80.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:1832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 882⤵
- Program crash
PID:2548
-