Behavioral task
behavioral1
Sample
3104-3-0x0000000000400000-0x000000000040B000-memory.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3104-3-0x0000000000400000-0x000000000040B000-memory.exe
Resource
win10v2004-20240611-en
General
-
Target
3104-3-0x0000000000400000-0x000000000040B000-memory.dmp
-
Size
44KB
-
MD5
25ef05eca2b618203ba06b066e47bdc9
-
SHA1
dcc5d80838235f35d28d2e28b5d2272e29f6c338
-
SHA256
12efe37d7a4c11c33a7def05f05691eb01923434a8cda8886bbd8de8b58e1ca3
-
SHA512
69211fe3eba6cc991cd71b80da39ee06d372848ea27446b2b74d581d99da63486796ca4be2d77aabeb71ec81a000a0c28b502c4eff0ea310711ea3f8da451e89
-
SSDEEP
768:Z/8mWE+vc4G6DhR8ZSDc28hO3c3VgDeoVZnE:2a+04G6DhR8658533s
Malware Config
Extracted
smokeloader
pub2
Signatures
-
Smokeloader family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 3104-3-0x0000000000400000-0x000000000040B000-memory.dmp
Files
-
3104-3-0x0000000000400000-0x000000000040B000-memory.dmp.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE