Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 22:26
Static task
static1
Behavioral task
behavioral1
Sample
sant.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
sant.exe
Resource
win10v2004-20241007-en
General
-
Target
sant.exe
-
Size
12KB
-
MD5
5effca91c3f1e9c87d364460097f8048
-
SHA1
28387c043ab6857aaa51865346046cf5dc4c7b49
-
SHA256
3fd826fc0c032721466b94ab3ec7dcfe006cc284e16132af6b91dfbc064b0907
-
SHA512
b0dba30fde295d3f7858db9d1463239b30cd84921971032b2afb96f811a53ac12c1e6f72013d2eff397b0b89c371e7c023c951cd2102f94157cba9918cd2c3e0
-
SSDEEP
192:I0EFK6COuHNlcW/1bXMvP8trt2mS3+dlRXwaziCP4kAIschKp0jeaJYrIC+sD:I0m/50t9bGPMrXSyGCP4kA6LyrIle
Malware Config
Extracted
smokeloader
2017
http://92.53.105.14/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum sant.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 sant.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2492 2272 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sant.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2272 sant.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe 2320 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2272 sant.exe 2272 sant.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2492 2272 sant.exe 30 PID 2272 wrote to memory of 2492 2272 sant.exe 30 PID 2272 wrote to memory of 2492 2272 sant.exe 30 PID 2272 wrote to memory of 2492 2272 sant.exe 30 PID 2272 wrote to memory of 2320 2272 sant.exe 31 PID 2272 wrote to memory of 2320 2272 sant.exe 31 PID 2272 wrote to memory of 2320 2272 sant.exe 31 PID 2272 wrote to memory of 2320 2272 sant.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\sant.exe"C:\Users\Admin\AppData\Local\Temp\sant.exe"1⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 2602⤵
- Program crash
PID:2492
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2320
-