Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
67s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
21/09/2022, 06:27
Static task
static1
Behavioral task
behavioral1
Sample
f55eae9ac8b79ff673e488d5eb5b462077007e0eabdc875a2c34afc3f1d0fc96.exe
Resource
win10-20220901-en
General
-
Target
f55eae9ac8b79ff673e488d5eb5b462077007e0eabdc875a2c34afc3f1d0fc96.exe
-
Size
148KB
-
MD5
32d71a468281fa6a54aba0344a65bb5b
-
SHA1
f8a61d1cb293ba8a438c1d74afb3cabbe7f49b68
-
SHA256
f55eae9ac8b79ff673e488d5eb5b462077007e0eabdc875a2c34afc3f1d0fc96
-
SHA512
8cb2a11b3a00ea20a701323acc3cb5d1d01b42f27c12c13701454ceea978052dedf60d2602b4b5a6578940914d6d3161bab55ed6740acd8cf70a5e4315042172
-
SSDEEP
3072:Fyxr5cpuNJcCxh9rqcZ0OHzZBgT8iL2In:rAJcCNrqAoTHL
Malware Config
Signatures
-
Detects Smokeloader packer 8 IoCs
resource yara_rule behavioral1/memory/4728-150-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4728-151-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/4728-163-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4728-182-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4828-214-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/1176-222-0x00000000001D0000-0x00000000001D9000-memory.dmp family_smokeloader behavioral1/memory/4828-246-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4828-247-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 1176 scwbhia 4828 scwbhia -
Deletes itself 1 IoCs
pid Process 3000 Process not Found -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2660 set thread context of 4728 2660 f55eae9ac8b79ff673e488d5eb5b462077007e0eabdc875a2c34afc3f1d0fc96.exe 66 PID 1176 set thread context of 4828 1176 scwbhia 68 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI scwbhia Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI scwbhia Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI scwbhia Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f55eae9ac8b79ff673e488d5eb5b462077007e0eabdc875a2c34afc3f1d0fc96.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f55eae9ac8b79ff673e488d5eb5b462077007e0eabdc875a2c34afc3f1d0fc96.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f55eae9ac8b79ff673e488d5eb5b462077007e0eabdc875a2c34afc3f1d0fc96.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4728 f55eae9ac8b79ff673e488d5eb5b462077007e0eabdc875a2c34afc3f1d0fc96.exe 4728 f55eae9ac8b79ff673e488d5eb5b462077007e0eabdc875a2c34afc3f1d0fc96.exe 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found 3000 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3000 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4728 f55eae9ac8b79ff673e488d5eb5b462077007e0eabdc875a2c34afc3f1d0fc96.exe 4828 scwbhia -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3000 Process not Found Token: SeCreatePagefilePrivilege 3000 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2660 wrote to memory of 4728 2660 f55eae9ac8b79ff673e488d5eb5b462077007e0eabdc875a2c34afc3f1d0fc96.exe 66 PID 2660 wrote to memory of 4728 2660 f55eae9ac8b79ff673e488d5eb5b462077007e0eabdc875a2c34afc3f1d0fc96.exe 66 PID 2660 wrote to memory of 4728 2660 f55eae9ac8b79ff673e488d5eb5b462077007e0eabdc875a2c34afc3f1d0fc96.exe 66 PID 2660 wrote to memory of 4728 2660 f55eae9ac8b79ff673e488d5eb5b462077007e0eabdc875a2c34afc3f1d0fc96.exe 66 PID 2660 wrote to memory of 4728 2660 f55eae9ac8b79ff673e488d5eb5b462077007e0eabdc875a2c34afc3f1d0fc96.exe 66 PID 2660 wrote to memory of 4728 2660 f55eae9ac8b79ff673e488d5eb5b462077007e0eabdc875a2c34afc3f1d0fc96.exe 66 PID 1176 wrote to memory of 4828 1176 scwbhia 68 PID 1176 wrote to memory of 4828 1176 scwbhia 68 PID 1176 wrote to memory of 4828 1176 scwbhia 68 PID 1176 wrote to memory of 4828 1176 scwbhia 68 PID 1176 wrote to memory of 4828 1176 scwbhia 68 PID 1176 wrote to memory of 4828 1176 scwbhia 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\f55eae9ac8b79ff673e488d5eb5b462077007e0eabdc875a2c34afc3f1d0fc96.exe"C:\Users\Admin\AppData\Local\Temp\f55eae9ac8b79ff673e488d5eb5b462077007e0eabdc875a2c34afc3f1d0fc96.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\f55eae9ac8b79ff673e488d5eb5b462077007e0eabdc875a2c34afc3f1d0fc96.exe"C:\Users\Admin\AppData\Local\Temp\f55eae9ac8b79ff673e488d5eb5b462077007e0eabdc875a2c34afc3f1d0fc96.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4728
-
-
C:\Users\Admin\AppData\Roaming\scwbhiaC:\Users\Admin\AppData\Roaming\scwbhia1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Roaming\scwbhiaC:\Users\Admin\AppData\Roaming\scwbhia2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4828
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD532d71a468281fa6a54aba0344a65bb5b
SHA1f8a61d1cb293ba8a438c1d74afb3cabbe7f49b68
SHA256f55eae9ac8b79ff673e488d5eb5b462077007e0eabdc875a2c34afc3f1d0fc96
SHA5128cb2a11b3a00ea20a701323acc3cb5d1d01b42f27c12c13701454ceea978052dedf60d2602b4b5a6578940914d6d3161bab55ed6740acd8cf70a5e4315042172
-
Filesize
148KB
MD532d71a468281fa6a54aba0344a65bb5b
SHA1f8a61d1cb293ba8a438c1d74afb3cabbe7f49b68
SHA256f55eae9ac8b79ff673e488d5eb5b462077007e0eabdc875a2c34afc3f1d0fc96
SHA5128cb2a11b3a00ea20a701323acc3cb5d1d01b42f27c12c13701454ceea978052dedf60d2602b4b5a6578940914d6d3161bab55ed6740acd8cf70a5e4315042172
-
Filesize
148KB
MD532d71a468281fa6a54aba0344a65bb5b
SHA1f8a61d1cb293ba8a438c1d74afb3cabbe7f49b68
SHA256f55eae9ac8b79ff673e488d5eb5b462077007e0eabdc875a2c34afc3f1d0fc96
SHA5128cb2a11b3a00ea20a701323acc3cb5d1d01b42f27c12c13701454ceea978052dedf60d2602b4b5a6578940914d6d3161bab55ed6740acd8cf70a5e4315042172