Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 02:49
Static task
static1
Behavioral task
behavioral1
Sample
c11e47f58a2c453c805054e8986adcdb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c11e47f58a2c453c805054e8986adcdb.exe
Resource
win10v2004-20241007-en
General
-
Target
c11e47f58a2c453c805054e8986adcdb.exe
-
Size
230KB
-
MD5
c11e47f58a2c453c805054e8986adcdb
-
SHA1
0a6dc7912f35adb81a8e40631a7ba4e9be9404f2
-
SHA256
4ac003df470aaa32ed68c6e4db4f01a6a04ea92b948279bd749783e43567c280
-
SHA512
09f3e1e6192afae851783a7d3fd0f4628059fcbe7b08ee56b5c6a1ee22c203bd3ba22b6e0e59549bf1ca4b2cfc486b05f7971203504352e3f5876e3e695f917a
-
SSDEEP
3072:5BUeqr0joT/swOZ+8KI9YqI1WaaMDr2v6nOI7kbM/h3qpZa9uD6VdyhkEzRv4:QeqcckbKB1Waq6nOZrwVfEz
Malware Config
Extracted
smokeloader
pub2
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2156 2528 WerFault.exe c11e47f58a2c453c805054e8986adcdb.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c11e47f58a2c453c805054e8986adcdb.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c11e47f58a2c453c805054e8986adcdb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
c11e47f58a2c453c805054e8986adcdb.exedescription pid process target process PID 2528 wrote to memory of 2156 2528 c11e47f58a2c453c805054e8986adcdb.exe WerFault.exe PID 2528 wrote to memory of 2156 2528 c11e47f58a2c453c805054e8986adcdb.exe WerFault.exe PID 2528 wrote to memory of 2156 2528 c11e47f58a2c453c805054e8986adcdb.exe WerFault.exe PID 2528 wrote to memory of 2156 2528 c11e47f58a2c453c805054e8986adcdb.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c11e47f58a2c453c805054e8986adcdb.exe"C:\Users\Admin\AppData\Local\Temp\c11e47f58a2c453c805054e8986adcdb.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 1402⤵
- Program crash
PID:2156
-