Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 04:11
Static task
static1
Behavioral task
behavioral1
Sample
52989d39907f499e92d2b965d00a114e03b8e17f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
52989d39907f499e92d2b965d00a114e03b8e17f.exe
Resource
win10v2004-20241007-en
General
-
Target
52989d39907f499e92d2b965d00a114e03b8e17f.exe
-
Size
246KB
-
MD5
17ca402e1a1e60105c8635170beb7609
-
SHA1
52989d39907f499e92d2b965d00a114e03b8e17f
-
SHA256
3002ca459085ee6c96caf63bba53feec3b776febc4c081476de98d1a6e7c15ce
-
SHA512
d8d74bead38b2d61774d077b8845060733e822fbcbbf22cf355ecc8a5d1a32a4e97a96974bc1b1ec86eabc79eb4513f905b5e75e9abab4aca18b4253b54183d6
-
SSDEEP
3072:5YqIm92AJlkPs0YuyrJO3XAs1Gy6XsEsvs+B:SqP2kkRtyrJOAJTgs
Malware Config
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2064 2148 WerFault.exe 52989d39907f499e92d2b965d00a114e03b8e17f.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
52989d39907f499e92d2b965d00a114e03b8e17f.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52989d39907f499e92d2b965d00a114e03b8e17f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
52989d39907f499e92d2b965d00a114e03b8e17f.exedescription pid process target process PID 2148 wrote to memory of 2064 2148 52989d39907f499e92d2b965d00a114e03b8e17f.exe WerFault.exe PID 2148 wrote to memory of 2064 2148 52989d39907f499e92d2b965d00a114e03b8e17f.exe WerFault.exe PID 2148 wrote to memory of 2064 2148 52989d39907f499e92d2b965d00a114e03b8e17f.exe WerFault.exe PID 2148 wrote to memory of 2064 2148 52989d39907f499e92d2b965d00a114e03b8e17f.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\52989d39907f499e92d2b965d00a114e03b8e17f.exe"C:\Users\Admin\AppData\Local\Temp\52989d39907f499e92d2b965d00a114e03b8e17f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 1402⤵
- Program crash
PID:2064
-