Static task
static1
Behavioral task
behavioral1
Sample
2025-02-13_ffc8df5d3f73f41f1029c36dd10d17a7_smoke-loader_wapomi.exe
Resource
win7-20240903-en
General
-
Target
2025-02-13_ffc8df5d3f73f41f1029c36dd10d17a7_smoke-loader_wapomi
-
Size
76KB
-
MD5
ffc8df5d3f73f41f1029c36dd10d17a7
-
SHA1
9071ba57bcf5d2d7db91f25804bacd9e71f172bd
-
SHA256
ddfb6c94f6064d3f0e83f4d577a526c1b1cd5779e9e21fab10ac5cecd8eecd23
-
SHA512
622bf8aa51b671bb829cf4ad60c10f52a3251b6bef1f501289489a25a63189d7fbd52d6cc2ba1d94715aa9ed894dc45a2226115d93ff7958b86013b1f365713e
-
SSDEEP
1536:cVMdRxy0K1vNy5GJqOppOesn6yGCq2iW7z:c+dRxyz1E3OH0VGCH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-02-13_ffc8df5d3f73f41f1029c36dd10d17a7_smoke-loader_wapomi
Files
-
2025-02-13_ffc8df5d3f73f41f1029c36dd10d17a7_smoke-loader_wapomi.exe windows:5 windows x86 arch:x86
87fb6a470b29020ecd2569e8081bf627
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathRemoveFileSpecA
mfc90
ord1446
ord3218
ord6356
ord5389
ord3671
ord6782
ord4160
ord6784
ord1644
ord2368
ord2375
ord2625
ord2607
ord2605
ord2623
ord2635
ord2612
ord2628
ord2633
ord2616
ord2618
ord2620
ord2614
ord2630
ord2610
ord969
ord965
ord967
ord963
ord958
ord5666
ord5668
ord6446
ord1729
ord4688
ord5139
ord3732
ord5636
ord4589
ord6780
ord5497
ord766
ord5585
ord4650
ord1496
ord4331
ord1752
ord1755
ord6388
ord3344
ord1678
ord1809
ord1810
ord4993
ord5309
ord5152
ord4617
ord5615
ord3987
ord1611
ord6613
ord305
ord3213
ord1137
ord1358
ord2591
ord2069
ord1108
ord595
ord3629
ord3277
ord5647
ord5608
ord6391
ord3346
ord820
ord5167
ord744
ord524
ord4760
ord6559
ord1715
ord2899
ord4431
ord639
ord3528
ord3534
ord2106
ord1183
ord793
ord4434
ord4409
ord6783
ord4159
ord6781
ord4733
ord2251
ord2206
ord6018
ord4165
ord1046
ord5533
ord6721
ord5813
ord4199
ord2087
ord3209
ord5657
ord5659
ord2447
ord4333
ord4981
ord5663
ord5646
ord6001
ord2766
ord2978
ord3107
ord4714
ord2961
ord3110
ord2769
ord2888
ord2759
ord4066
ord4067
ord4057
ord2886
ord4334
ord4890
ord4667
ord3659
ord589
ord4952
ord4029
ord310
ord6676
ord941
ord316
ord2539
ord4392
ord910
ord300
ord4311
ord945
ord2139
ord1792
ord1791
ord1728
ord5633
ord3135
ord4895
ord4668
ord3506
ord374
ord1098
ord1497
ord2208
ord3178
ord601
ord6154
ord817
ord1252
ord781
ord6120
ord3647
ord580
ord800
ord2074
ord1276
msvcr90
strcpy_s
strcat_s
__CxxFrameHandler3
strncpy_s
memset
_setmbcp
_controlfp_s
_invoke_watson
_except_handler4_common
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
_access
_stricmp
kernel32
MapViewOfFile
UnmapViewOfFile
CloseHandle
LoadLibraryA
FreeLibrary
OpenFileMappingA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
GetSystemInfo
GetModuleHandleA
GlobalMemoryStatusEx
GetTickCount
GetProcAddress
user32
GetSystemMetrics
LoadIconA
EnableWindow
KillTimer
SetTimer
GetClientRect
IsIconic
GetSystemMenu
SendMessageA
AppendMenuA
DrawIcon
PeekMessageA
gdi32
CreateFontA
advapi32
RegOpenKeyA
RegCloseKey
RegQueryValueExA
shell32
ShellExecuteA
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
C_��ud Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE