Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
62s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
08/09/2022, 04:03
Static task
static1
Behavioral task
behavioral1
Sample
0b797e4554fd71f4ef86b8ed2873055303052e759b5c2cc4815e7cfb923bf847.exe
Resource
win10-20220812-en
General
-
Target
0b797e4554fd71f4ef86b8ed2873055303052e759b5c2cc4815e7cfb923bf847.exe
-
Size
259KB
-
MD5
698e409b4dc4e576598100afbfb4c746
-
SHA1
101da7336333fb74c6c2f3974b06e5364ed6b62c
-
SHA256
0b797e4554fd71f4ef86b8ed2873055303052e759b5c2cc4815e7cfb923bf847
-
SHA512
421f72c16ba00c787693540e068ef1ca8e4113f62546761228f1081d3537fbc061ff32453e6333417743d1ccfb1fc40c7cdbf5dd3863d6be3545fa90bc613d3d
-
SSDEEP
6144:7e+fw+DqhaAJ53U7cbKxA78CaEbuEtn8Dh:7ed+mgI53U7cb37HbuEN
Malware Config
Signatures
-
Detects Smokeloader packer 5 IoCs
resource yara_rule behavioral1/memory/3824-142-0x0000000000AC0000-0x0000000000AC9000-memory.dmp family_smokeloader behavioral1/memory/2132-146-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/2132-145-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2132-161-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2132-178-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3068 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3824 set thread context of 2132 3824 0b797e4554fd71f4ef86b8ed2873055303052e759b5c2cc4815e7cfb923bf847.exe 67 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0b797e4554fd71f4ef86b8ed2873055303052e759b5c2cc4815e7cfb923bf847.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0b797e4554fd71f4ef86b8ed2873055303052e759b5c2cc4815e7cfb923bf847.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0b797e4554fd71f4ef86b8ed2873055303052e759b5c2cc4815e7cfb923bf847.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2132 0b797e4554fd71f4ef86b8ed2873055303052e759b5c2cc4815e7cfb923bf847.exe 2132 0b797e4554fd71f4ef86b8ed2873055303052e759b5c2cc4815e7cfb923bf847.exe 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3068 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2132 0b797e4554fd71f4ef86b8ed2873055303052e759b5c2cc4815e7cfb923bf847.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3824 wrote to memory of 2132 3824 0b797e4554fd71f4ef86b8ed2873055303052e759b5c2cc4815e7cfb923bf847.exe 67 PID 3824 wrote to memory of 2132 3824 0b797e4554fd71f4ef86b8ed2873055303052e759b5c2cc4815e7cfb923bf847.exe 67 PID 3824 wrote to memory of 2132 3824 0b797e4554fd71f4ef86b8ed2873055303052e759b5c2cc4815e7cfb923bf847.exe 67 PID 3824 wrote to memory of 2132 3824 0b797e4554fd71f4ef86b8ed2873055303052e759b5c2cc4815e7cfb923bf847.exe 67 PID 3824 wrote to memory of 2132 3824 0b797e4554fd71f4ef86b8ed2873055303052e759b5c2cc4815e7cfb923bf847.exe 67 PID 3824 wrote to memory of 2132 3824 0b797e4554fd71f4ef86b8ed2873055303052e759b5c2cc4815e7cfb923bf847.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b797e4554fd71f4ef86b8ed2873055303052e759b5c2cc4815e7cfb923bf847.exe"C:\Users\Admin\AppData\Local\Temp\0b797e4554fd71f4ef86b8ed2873055303052e759b5c2cc4815e7cfb923bf847.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\0b797e4554fd71f4ef86b8ed2873055303052e759b5c2cc4815e7cfb923bf847.exe"C:\Users\Admin\AppData\Local\Temp\0b797e4554fd71f4ef86b8ed2873055303052e759b5c2cc4815e7cfb923bf847.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2132
-