Analysis
-
max time kernel
93s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 10:42
Static task
static1
Behavioral task
behavioral1
Sample
kill.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
kill.exe
Resource
win10v2004-20241007-en
General
-
Target
kill.exe
-
Size
13KB
-
MD5
789f1016740449ce3e9a7fe210383460
-
SHA1
e0905d363448178d485ed15ee6f67b0f1d72e728
-
SHA256
71068065d8dd7daa9c49687b973d05d5602ed994467728763d2213fe4d90c0d8
-
SHA512
b63467a55f11f8e3e6dfee195e5a64d7dec621834e1c26e1f64210496dbad36409771968a5e3b2f142fb6196df5689c012f5971ca2fd4bb3b1311f8f66f2f2fa
-
SSDEEP
192:vBAlEMZWAY5nCtCY61l40CMvPSohzWLz5xWfgOQ/muu/d5THm4OtwO:JAnLAXNy/m3/bTKwO
Malware Config
Extracted
smokeloader
2017
http://dogewareservice.ru/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum kill.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 kill.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2040 3260 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe 4348 kill.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4348 kill.exe 4348 kill.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4348 wrote to memory of 3260 4348 kill.exe 87 PID 4348 wrote to memory of 3260 4348 kill.exe 87 PID 4348 wrote to memory of 3260 4348 kill.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\kill.exe"C:\Users\Admin\AppData\Local\Temp\kill.exe"1⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
- System Location Discovery: System Language Discovery
PID:3260 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3260 -s 11163⤵
- Program crash
PID:2040
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3260 -ip 32601⤵PID:1116