Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 13:07
Static task
static1
Behavioral task
behavioral1
Sample
kebab.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
kebab.exe
Resource
win10v2004-20241007-en
General
-
Target
kebab.exe
-
Size
13KB
-
MD5
59b9c351412e31d38899158ff546ff2e
-
SHA1
d51cc28f090308c329fb77c961a23553299500f7
-
SHA256
726e53e8bf9d5e3ed36fce83aa7d3256d127ac1b80a93d7af80bd0db494876ef
-
SHA512
c0602b8cf5f96f43f89bf38551d1d0a22f380b235785d925cc5cb5522f0470068bf2b4d414aa1152553b1b4c157eb3d285c823523be84aaedf9a8fbe438ed52a
-
SSDEEP
192:vBAlEMZWAY5nCtCY61l40CMvPSohzWLz5xWfgOQ/muu/d5THm4OtXON:JAnLAXNy/m3/bTKXON
Malware Config
Extracted
smokeloader
2017
http://dogewareservice.ru/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum kebab.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 kebab.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2632 4604 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kebab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe 3056 kebab.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3056 kebab.exe 3056 kebab.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3056 wrote to memory of 4604 3056 kebab.exe 84 PID 3056 wrote to memory of 4604 3056 kebab.exe 84 PID 3056 wrote to memory of 4604 3056 kebab.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\kebab.exe"C:\Users\Admin\AppData\Local\Temp\kebab.exe"1⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
- System Location Discovery: System Language Discovery
PID:4604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 9723⤵
- Program crash
PID:2632
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 4604 -ip 46041⤵PID:2024