Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2025 19:05
Static task
static1
Behavioral task
behavioral1
Sample
client.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
client.exe
Resource
win10v2004-20241007-en
General
-
Target
client.exe
-
Size
103KB
-
MD5
b53bbcfca226226405217bba4f8b2532
-
SHA1
6a84eb91adb4ec5b3b18929fb5e0bfd39cc41fb2
-
SHA256
be09ac01404b9a32552b8bea765128a3e197a4bf77e909892d00aa2d157d6871
-
SHA512
f8b51680dbca520ed6877ca5cc1a003258a03bdd802c69985d658375562608c004084463363c9a2ed92b7552c36ba729b1863a1693990186e0f188ff3cc1ec86
-
SSDEEP
1536:KOhk60PnYkfH77Xcsg23bH/0cRDrKOyaxPoWvVVZ5ElaSePrpf3n3:HuJ/hRvg2TzEla3PVH
Malware Config
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/4600-1-0x0000000000760000-0x0000000000780000-memory.dmp net_reactor -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4600 set thread context of 2232 4600 client.exe 85 -
Program crash 1 IoCs
pid pid_target Process procid_target 3032 4600 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI client.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI client.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI client.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4600 wrote to memory of 1224 4600 client.exe 82 PID 4600 wrote to memory of 1224 4600 client.exe 82 PID 4600 wrote to memory of 1224 4600 client.exe 82 PID 4600 wrote to memory of 2956 4600 client.exe 83 PID 4600 wrote to memory of 2956 4600 client.exe 83 PID 4600 wrote to memory of 2956 4600 client.exe 83 PID 4600 wrote to memory of 4524 4600 client.exe 84 PID 4600 wrote to memory of 4524 4600 client.exe 84 PID 4600 wrote to memory of 4524 4600 client.exe 84 PID 4600 wrote to memory of 2232 4600 client.exe 85 PID 4600 wrote to memory of 2232 4600 client.exe 85 PID 4600 wrote to memory of 2232 4600 client.exe 85 PID 4600 wrote to memory of 2232 4600 client.exe 85 PID 4600 wrote to memory of 2232 4600 client.exe 85 PID 4600 wrote to memory of 2232 4600 client.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\client.exe"C:\Users\Admin\AppData\Local\Temp\client.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\client.exe"C:\Users\Admin\AppData\Local\Temp\client.exe"2⤵PID:1224
-
-
C:\Users\Admin\AppData\Local\Temp\client.exe"C:\Users\Admin\AppData\Local\Temp\client.exe"2⤵PID:2956
-
-
C:\Users\Admin\AppData\Local\Temp\client.exe"C:\Users\Admin\AppData\Local\Temp\client.exe"2⤵PID:4524
-
-
C:\Users\Admin\AppData\Local\Temp\client.exe"C:\Users\Admin\AppData\Local\Temp\client.exe"2⤵
- Checks SCSI registry key(s)
PID:2232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4600 -s 8282⤵
- Program crash
PID:3032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4600 -ip 46001⤵PID:3092