Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 02:04
Static task
static1
Behavioral task
behavioral1
Sample
5b369270ccdb8bfcdb7a232bde73c216.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
5b369270ccdb8bfcdb7a232bde73c216.exe
Resource
win10v2004-20241007-en
General
-
Target
5b369270ccdb8bfcdb7a232bde73c216.exe
-
Size
276KB
-
MD5
5b369270ccdb8bfcdb7a232bde73c216
-
SHA1
f97910ae714cf56b9cc7961e1dd8243b12ddf9aa
-
SHA256
45f315491f2b8a4e84dc2695908640eb52dbb027f5642c22c531aea6ff4bf305
-
SHA512
ffb4f6376f9be354ebf39cafc81e7c1312e34b72666eeb0a50ceceb99feddbac798286025ef8b29d5b12b465b9839c8dbb43ec5a6a7962442da1e1acec933b70
-
SSDEEP
6144:ML2Xdpu8xfpjChSpKqFRbiLBRDfKcV4M9Q2ffJ8C:MLGdg6fxeSpKqFQRDyK4Mi+d
Malware Config
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2108 2596 WerFault.exe 5b369270ccdb8bfcdb7a232bde73c216.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
5b369270ccdb8bfcdb7a232bde73c216.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b369270ccdb8bfcdb7a232bde73c216.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
5b369270ccdb8bfcdb7a232bde73c216.exedescription pid process target process PID 2596 wrote to memory of 2108 2596 5b369270ccdb8bfcdb7a232bde73c216.exe WerFault.exe PID 2596 wrote to memory of 2108 2596 5b369270ccdb8bfcdb7a232bde73c216.exe WerFault.exe PID 2596 wrote to memory of 2108 2596 5b369270ccdb8bfcdb7a232bde73c216.exe WerFault.exe PID 2596 wrote to memory of 2108 2596 5b369270ccdb8bfcdb7a232bde73c216.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b369270ccdb8bfcdb7a232bde73c216.exe"C:\Users\Admin\AppData\Local\Temp\5b369270ccdb8bfcdb7a232bde73c216.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 1362⤵
- Program crash
PID:2108
-