Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 16:51
Static task
static1
Behavioral task
behavioral1
Sample
7a2cca471305ef8e68fd3186d003b3692aaa10713e97475ece93b46540c5b599.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7a2cca471305ef8e68fd3186d003b3692aaa10713e97475ece93b46540c5b599.exe
Resource
win10v2004-20240508-en
General
-
Target
7a2cca471305ef8e68fd3186d003b3692aaa10713e97475ece93b46540c5b599.exe
-
Size
319KB
-
MD5
810a594d2c51d6b0ca26c263a6281b6b
-
SHA1
8211efff6c51d6f5ca12a06cbf3e35a24f799205
-
SHA256
7a2cca471305ef8e68fd3186d003b3692aaa10713e97475ece93b46540c5b599
-
SHA512
193ecbe212dad24a02c953a37310cfd1b55c8b2ab1d759d1da0b488a9c9b3000c98f6a568cb0ad931b1b58faa921bae167e7c127e80b3463dc82b3090c142e24
-
SSDEEP
3072:zh9LGoR2E47vK78abwX4/UlUIUyY4n1um5Lt4LtOQ8p1Ek1E5xTEqS:zjLGoRn4eI/XJfdn1J8/83N3
Malware Config
Extracted
smokeloader
pub2
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2196-2-0x0000000000250000-0x0000000000350000-memory.dmpFilesize
1024KB
-
memory/2196-3-0x00000000001B0000-0x00000000001BB000-memory.dmpFilesize
44KB
-
memory/2196-4-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/2196-1-0x0000000000400000-0x000000000273C000-memory.dmpFilesize
35.2MB