Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 05:44
Static task
static1
Behavioral task
behavioral1
Sample
0130c11b53ec26b4b37ee0dceda90799.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
0130c11b53ec26b4b37ee0dceda90799.exe
Resource
win10v2004-20241007-en
General
-
Target
0130c11b53ec26b4b37ee0dceda90799.exe
-
Size
372KB
-
MD5
0130c11b53ec26b4b37ee0dceda90799
-
SHA1
5e54145ebcfe4aab336ccd204b72d29d65fc6ee3
-
SHA256
e78767db61043ce9cc7e4b1b6c4b712c6c1f4b577d32545ea4d66de9b7e0903c
-
SHA512
d3a53773e3058b2bc26a865870a543d623dcc41192b26b69e7307d00bbc1858e3350ffdb954e093d5146c1c8a763e704b0d8f2ffa16eaa76319862f632ae1516
-
SSDEEP
6144:VOcEdYILn7QQDifPeIY4yow1+feGFllCYEDHcM6++ra9n:VO9pD7QYifPzYnzY3UDI+6
Malware Config
Extracted
smokeloader
oct
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Program crash 1 IoCs
pid pid_target Process procid_target 2928 2244 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0130c11b53ec26b4b37ee0dceda90799.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2928 2244 0130c11b53ec26b4b37ee0dceda90799.exe 30 PID 2244 wrote to memory of 2928 2244 0130c11b53ec26b4b37ee0dceda90799.exe 30 PID 2244 wrote to memory of 2928 2244 0130c11b53ec26b4b37ee0dceda90799.exe 30 PID 2244 wrote to memory of 2928 2244 0130c11b53ec26b4b37ee0dceda90799.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0130c11b53ec26b4b37ee0dceda90799.exe"C:\Users\Admin\AppData\Local\Temp\0130c11b53ec26b4b37ee0dceda90799.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 1402⤵
- Program crash
PID:2928
-