Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
18/09/2022, 13:28
Static task
static1
Behavioral task
behavioral1
Sample
3c38db571f68ad5e579b6638f344da22b733eafaca91d82f88bfd4545cab2204.exe
Resource
win10-20220812-en
General
-
Target
3c38db571f68ad5e579b6638f344da22b733eafaca91d82f88bfd4545cab2204.exe
-
Size
291KB
-
MD5
2858c95b4eda85dd9b715caa11325486
-
SHA1
9e6c401da9cfbd632fcb234c5d2b8075bba32fa6
-
SHA256
3c38db571f68ad5e579b6638f344da22b733eafaca91d82f88bfd4545cab2204
-
SHA512
b7a7691d44fdd4eb655180666fb931da55ee2cebfb1543b191ddce2512d1d3f75b17f266ee5432037c02074091ed9e1af9b00ef0b32deaa24a254f5ff08b5ba0
-
SSDEEP
6144:AI2YdHLLr7xi9tHmugciU6ah00tQ+4nigabwVf:AST7xUtZsz0aFi
Malware Config
Signatures
-
Detects Smokeloader packer 7 IoCs
resource yara_rule behavioral1/memory/2688-140-0x0000000000570000-0x0000000000579000-memory.dmp family_smokeloader behavioral1/memory/4544-145-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/4544-144-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4544-158-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4544-177-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/956-208-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/956-240-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 4872 fhatwag 956 fhatwag -
Deletes itself 1 IoCs
pid Process 3048 Process not Found -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2688 set thread context of 4544 2688 3c38db571f68ad5e579b6638f344da22b733eafaca91d82f88bfd4545cab2204.exe 66 PID 4872 set thread context of 956 4872 fhatwag 68 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3c38db571f68ad5e579b6638f344da22b733eafaca91d82f88bfd4545cab2204.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3c38db571f68ad5e579b6638f344da22b733eafaca91d82f88bfd4545cab2204.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3c38db571f68ad5e579b6638f344da22b733eafaca91d82f88bfd4545cab2204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fhatwag Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fhatwag Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fhatwag -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4544 3c38db571f68ad5e579b6638f344da22b733eafaca91d82f88bfd4545cab2204.exe 4544 3c38db571f68ad5e579b6638f344da22b733eafaca91d82f88bfd4545cab2204.exe 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found 3048 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3048 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4544 3c38db571f68ad5e579b6638f344da22b733eafaca91d82f88bfd4545cab2204.exe 956 fhatwag -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3048 Process not Found Token: SeCreatePagefilePrivilege 3048 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2688 wrote to memory of 4544 2688 3c38db571f68ad5e579b6638f344da22b733eafaca91d82f88bfd4545cab2204.exe 66 PID 2688 wrote to memory of 4544 2688 3c38db571f68ad5e579b6638f344da22b733eafaca91d82f88bfd4545cab2204.exe 66 PID 2688 wrote to memory of 4544 2688 3c38db571f68ad5e579b6638f344da22b733eafaca91d82f88bfd4545cab2204.exe 66 PID 2688 wrote to memory of 4544 2688 3c38db571f68ad5e579b6638f344da22b733eafaca91d82f88bfd4545cab2204.exe 66 PID 2688 wrote to memory of 4544 2688 3c38db571f68ad5e579b6638f344da22b733eafaca91d82f88bfd4545cab2204.exe 66 PID 2688 wrote to memory of 4544 2688 3c38db571f68ad5e579b6638f344da22b733eafaca91d82f88bfd4545cab2204.exe 66 PID 4872 wrote to memory of 956 4872 fhatwag 68 PID 4872 wrote to memory of 956 4872 fhatwag 68 PID 4872 wrote to memory of 956 4872 fhatwag 68 PID 4872 wrote to memory of 956 4872 fhatwag 68 PID 4872 wrote to memory of 956 4872 fhatwag 68 PID 4872 wrote to memory of 956 4872 fhatwag 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c38db571f68ad5e579b6638f344da22b733eafaca91d82f88bfd4545cab2204.exe"C:\Users\Admin\AppData\Local\Temp\3c38db571f68ad5e579b6638f344da22b733eafaca91d82f88bfd4545cab2204.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\3c38db571f68ad5e579b6638f344da22b733eafaca91d82f88bfd4545cab2204.exe"C:\Users\Admin\AppData\Local\Temp\3c38db571f68ad5e579b6638f344da22b733eafaca91d82f88bfd4545cab2204.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4544
-
-
C:\Users\Admin\AppData\Roaming\fhatwagC:\Users\Admin\AppData\Roaming\fhatwag1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Roaming\fhatwagC:\Users\Admin\AppData\Roaming\fhatwag2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:956
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
291KB
MD52858c95b4eda85dd9b715caa11325486
SHA19e6c401da9cfbd632fcb234c5d2b8075bba32fa6
SHA2563c38db571f68ad5e579b6638f344da22b733eafaca91d82f88bfd4545cab2204
SHA512b7a7691d44fdd4eb655180666fb931da55ee2cebfb1543b191ddce2512d1d3f75b17f266ee5432037c02074091ed9e1af9b00ef0b32deaa24a254f5ff08b5ba0
-
Filesize
291KB
MD52858c95b4eda85dd9b715caa11325486
SHA19e6c401da9cfbd632fcb234c5d2b8075bba32fa6
SHA2563c38db571f68ad5e579b6638f344da22b733eafaca91d82f88bfd4545cab2204
SHA512b7a7691d44fdd4eb655180666fb931da55ee2cebfb1543b191ddce2512d1d3f75b17f266ee5432037c02074091ed9e1af9b00ef0b32deaa24a254f5ff08b5ba0
-
Filesize
291KB
MD52858c95b4eda85dd9b715caa11325486
SHA19e6c401da9cfbd632fcb234c5d2b8075bba32fa6
SHA2563c38db571f68ad5e579b6638f344da22b733eafaca91d82f88bfd4545cab2204
SHA512b7a7691d44fdd4eb655180666fb931da55ee2cebfb1543b191ddce2512d1d3f75b17f266ee5432037c02074091ed9e1af9b00ef0b32deaa24a254f5ff08b5ba0