Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2022, 09:02
Static task
static1
Behavioral task
behavioral1
Sample
24219cefc4c4ef9c8ab106a5e0c34939ad3aeeb02266a3210396d3cde3ee77c5.exe
Resource
win10v2004-20220812-en
General
-
Target
24219cefc4c4ef9c8ab106a5e0c34939ad3aeeb02266a3210396d3cde3ee77c5.exe
-
Size
147KB
-
MD5
4a550b330463ef0bbf1c89b3d920bc8b
-
SHA1
5024720813bdb71b2bc69d676ae4453eb08d3a37
-
SHA256
24219cefc4c4ef9c8ab106a5e0c34939ad3aeeb02266a3210396d3cde3ee77c5
-
SHA512
06ba1503bf73e3674afdfab9b612fbee6f5188675e622b68203a9f317089bcc9c6fa78d21ade9098dc7bd90cb9688ce5b3c7ad60b6c65540af6be9519f20ec9f
-
SSDEEP
3072:MuxpJhF5l7yhHIYhGM5GzArbRRmZqDs6bBJNmpIn:V9WhIdzUlQZgm
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/3996-133-0x00000000005C0000-0x00000000005C9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 24219cefc4c4ef9c8ab106a5e0c34939ad3aeeb02266a3210396d3cde3ee77c5.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 24219cefc4c4ef9c8ab106a5e0c34939ad3aeeb02266a3210396d3cde3ee77c5.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 24219cefc4c4ef9c8ab106a5e0c34939ad3aeeb02266a3210396d3cde3ee77c5.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3996 24219cefc4c4ef9c8ab106a5e0c34939ad3aeeb02266a3210396d3cde3ee77c5.exe 3996 24219cefc4c4ef9c8ab106a5e0c34939ad3aeeb02266a3210396d3cde3ee77c5.exe 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3044 Process not Found -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 3996 24219cefc4c4ef9c8ab106a5e0c34939ad3aeeb02266a3210396d3cde3ee77c5.exe 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3044 wrote to memory of 4412 3044 Process not Found 86 PID 3044 wrote to memory of 4412 3044 Process not Found 86 PID 3044 wrote to memory of 4412 3044 Process not Found 86 PID 3044 wrote to memory of 4412 3044 Process not Found 86 PID 3044 wrote to memory of 4592 3044 Process not Found 87 PID 3044 wrote to memory of 4592 3044 Process not Found 87 PID 3044 wrote to memory of 4592 3044 Process not Found 87 PID 3044 wrote to memory of 2460 3044 Process not Found 88 PID 3044 wrote to memory of 2460 3044 Process not Found 88 PID 3044 wrote to memory of 2460 3044 Process not Found 88 PID 3044 wrote to memory of 2460 3044 Process not Found 88 PID 3044 wrote to memory of 2568 3044 Process not Found 89 PID 3044 wrote to memory of 2568 3044 Process not Found 89 PID 3044 wrote to memory of 2568 3044 Process not Found 89 PID 3044 wrote to memory of 5088 3044 Process not Found 90 PID 3044 wrote to memory of 5088 3044 Process not Found 90 PID 3044 wrote to memory of 5088 3044 Process not Found 90 PID 3044 wrote to memory of 5088 3044 Process not Found 90 PID 3044 wrote to memory of 2244 3044 Process not Found 91 PID 3044 wrote to memory of 2244 3044 Process not Found 91 PID 3044 wrote to memory of 2244 3044 Process not Found 91 PID 3044 wrote to memory of 2244 3044 Process not Found 91 PID 3044 wrote to memory of 1188 3044 Process not Found 92 PID 3044 wrote to memory of 1188 3044 Process not Found 92 PID 3044 wrote to memory of 1188 3044 Process not Found 92 PID 3044 wrote to memory of 1188 3044 Process not Found 92 PID 3044 wrote to memory of 3872 3044 Process not Found 93 PID 3044 wrote to memory of 3872 3044 Process not Found 93 PID 3044 wrote to memory of 3872 3044 Process not Found 93 PID 3044 wrote to memory of 3340 3044 Process not Found 94 PID 3044 wrote to memory of 3340 3044 Process not Found 94 PID 3044 wrote to memory of 3340 3044 Process not Found 94 PID 3044 wrote to memory of 3340 3044 Process not Found 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\24219cefc4c4ef9c8ab106a5e0c34939ad3aeeb02266a3210396d3cde3ee77c5.exe"C:\Users\Admin\AppData\Local\Temp\24219cefc4c4ef9c8ab106a5e0c34939ad3aeeb02266a3210396d3cde3ee77c5.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3996
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4412
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4592
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2460
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2568
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5088
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2244
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1188
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3872
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3340