Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
02-07-2024 19:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bdcf37dcbb1947e5a3f6145d47fc67e8.exe
Resource
win7-20240611-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
bdcf37dcbb1947e5a3f6145d47fc67e8.exe
Resource
win10v2004-20240611-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
bdcf37dcbb1947e5a3f6145d47fc67e8.exe
-
Size
172KB
-
MD5
bdcf37dcbb1947e5a3f6145d47fc67e8
-
SHA1
cee0cf2eaf723c8980ce2f85b882f78be880da08
-
SHA256
37e6e5d8b399fefb9ae774516ff6367e800c69a272e18a654bb84ccff2d7c67a
-
SHA512
35f2bc215bb311d763a45a741fff101dcdc2cd05171377c1041b3950d373ce06082bc9d6e7869407277be75062531e57428d04ae1cf02f72ad4bdedece220d48
-
SSDEEP
3072:LG51L3RDkzFnZhvrDYr/oQT5PJiZ+39a1KuU3:651L3RYFr/ib+43h7
Score
10/10
Malware Config
Extracted
Family
smokeloader
Botnet
pub1
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1756-4-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/1756-2-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/1756-1-0x0000000002790000-0x0000000002890000-memory.dmpFilesize
1024KB
-
memory/1756-5-0x0000000000400000-0x0000000002719000-memory.dmpFilesize
35.1MB
-
memory/1756-6-0x0000000000400000-0x0000000002719000-memory.dmpFilesize
35.1MB