Analysis
-
max time kernel
181s -
max time network
312s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2025 20:29
Static task
static1
Behavioral task
behavioral1
Sample
svc1.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
svc1.exe
Resource
win10v2004-20250129-en
General
-
Target
svc1.exe
-
Size
112KB
-
MD5
5c1afd27623185ab5fafe9753c2d92db
-
SHA1
29e05c0f600190f91bd4709b2bb0a9aba41590b2
-
SHA256
1118a93cc63a70ba8348182f7012ddbeecf890345941c82376ac967faf55a295
-
SHA512
05b89fc0ec46cfc49a02c9b3042e3f763afbea34e559eb8687b68e1fb2c7c16efec8c5ee6b2a09f8ee2d6d415a871d47a4d8f065aa40634c946ac1873185cd96
-
SSDEEP
3072:JAZhRxolxAMMnyrYfKsvWfRaY/UvrYDCQ8/kQ:JahKzChWcisYDC9/kQ
Malware Config
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2476 set thread context of 2296 2476 svc1.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 4544 2476 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svc1.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI svc1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI svc1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI svc1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2296 2476 svc1.exe 86 PID 2476 wrote to memory of 2296 2476 svc1.exe 86 PID 2476 wrote to memory of 2296 2476 svc1.exe 86 PID 2476 wrote to memory of 2296 2476 svc1.exe 86 PID 2476 wrote to memory of 2296 2476 svc1.exe 86 PID 2476 wrote to memory of 2296 2476 svc1.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\svc1.exe"C:\Users\Admin\AppData\Local\Temp\svc1.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\svc1.exe"C:\Users\Admin\AppData\Local\Temp\svc1.exe"2⤵
- Checks SCSI registry key(s)
PID:2296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 8162⤵
- Program crash
PID:4544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2476 -ip 24761⤵PID:2344