Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
28/09/2022, 16:45
Static task
static1
Behavioral task
behavioral1
Sample
6e073af595df46e635231ce8d62194e1b6c53a90eaa08a4051e9eb53022f82bd.exe
Resource
win10-20220812-en
General
-
Target
6e073af595df46e635231ce8d62194e1b6c53a90eaa08a4051e9eb53022f82bd.exe
-
Size
295KB
-
MD5
fd3863dfd5b35b2c208409044f6614c1
-
SHA1
be885f0ee463608deeba2ffed2e82fb13313706c
-
SHA256
6e073af595df46e635231ce8d62194e1b6c53a90eaa08a4051e9eb53022f82bd
-
SHA512
385925ab2ee0350c92523fe2037c9d897d78bc132eca52e936cb20791961722365ac4390d53495b1fe1136e481c64e390684a7fa2e638a57c31dc3af77d10006
-
SSDEEP
6144:bwGWa1hltWmb7lJuBACMd0q1igavwVfI:bdltWmb2AYqYR
Malware Config
Signatures
-
Detects Smokeloader packer 5 IoCs
resource yara_rule behavioral1/memory/2700-145-0x00000000001D0000-0x00000000001D9000-memory.dmp family_smokeloader behavioral1/memory/4784-146-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4784-147-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/4784-161-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4784-178-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1736 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2700 set thread context of 4784 2700 6e073af595df46e635231ce8d62194e1b6c53a90eaa08a4051e9eb53022f82bd.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6e073af595df46e635231ce8d62194e1b6c53a90eaa08a4051e9eb53022f82bd.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6e073af595df46e635231ce8d62194e1b6c53a90eaa08a4051e9eb53022f82bd.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6e073af595df46e635231ce8d62194e1b6c53a90eaa08a4051e9eb53022f82bd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4784 6e073af595df46e635231ce8d62194e1b6c53a90eaa08a4051e9eb53022f82bd.exe 4784 6e073af595df46e635231ce8d62194e1b6c53a90eaa08a4051e9eb53022f82bd.exe 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found 1736 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1736 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4784 6e073af595df46e635231ce8d62194e1b6c53a90eaa08a4051e9eb53022f82bd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2700 wrote to memory of 4784 2700 6e073af595df46e635231ce8d62194e1b6c53a90eaa08a4051e9eb53022f82bd.exe 66 PID 2700 wrote to memory of 4784 2700 6e073af595df46e635231ce8d62194e1b6c53a90eaa08a4051e9eb53022f82bd.exe 66 PID 2700 wrote to memory of 4784 2700 6e073af595df46e635231ce8d62194e1b6c53a90eaa08a4051e9eb53022f82bd.exe 66 PID 2700 wrote to memory of 4784 2700 6e073af595df46e635231ce8d62194e1b6c53a90eaa08a4051e9eb53022f82bd.exe 66 PID 2700 wrote to memory of 4784 2700 6e073af595df46e635231ce8d62194e1b6c53a90eaa08a4051e9eb53022f82bd.exe 66 PID 2700 wrote to memory of 4784 2700 6e073af595df46e635231ce8d62194e1b6c53a90eaa08a4051e9eb53022f82bd.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e073af595df46e635231ce8d62194e1b6c53a90eaa08a4051e9eb53022f82bd.exe"C:\Users\Admin\AppData\Local\Temp\6e073af595df46e635231ce8d62194e1b6c53a90eaa08a4051e9eb53022f82bd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\6e073af595df46e635231ce8d62194e1b6c53a90eaa08a4051e9eb53022f82bd.exe"C:\Users\Admin\AppData\Local\Temp\6e073af595df46e635231ce8d62194e1b6c53a90eaa08a4051e9eb53022f82bd.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4784
-