Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05-07-2024 01:38
Static task
static1
Behavioral task
behavioral1
Sample
9d7926dac81c4f7200c84298c7839162a2996339262f58bd815d2a94c380a151.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9d7926dac81c4f7200c84298c7839162a2996339262f58bd815d2a94c380a151.exe
Resource
win10v2004-20240508-en
General
-
Target
9d7926dac81c4f7200c84298c7839162a2996339262f58bd815d2a94c380a151.exe
-
Size
187KB
-
MD5
e337b912b6816939b56c2c03859cabb4
-
SHA1
fbb4ad3e5c3cac638d075b1add6db11c55c50794
-
SHA256
9d7926dac81c4f7200c84298c7839162a2996339262f58bd815d2a94c380a151
-
SHA512
c10a4c025d7c57bb9b05e1dfeb691cfb603ffc4576a9e7d3124ae4f07ed476581ab279b1c2f5df2e56c6b876125181881730bbf77871d103a96cc2d0de3b0b91
-
SSDEEP
3072:VQ/oCSIn5XYG4cGuZVCIZiXuy3LN3IQDEkkNmWKNMnOn9nD:VQlx5TrZ9ZiXV32gNMS9
Malware Config
Extracted
smokeloader
pub1
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2472-2-0x0000000002DC0000-0x0000000002EC0000-memory.dmpFilesize
1024KB
-
memory/2472-4-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/2472-3-0x0000000000220000-0x000000000022B000-memory.dmpFilesize
44KB
-
memory/2472-1-0x0000000000400000-0x0000000002BE7000-memory.dmpFilesize
39.9MB