Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
06/10/2022, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
7c551c2816ea32d34c3f8ae27f272aa8f47db325e988e3ba58b4fc0e5cf9ca89.exe
Resource
win10-20220812-en
General
-
Target
7c551c2816ea32d34c3f8ae27f272aa8f47db325e988e3ba58b4fc0e5cf9ca89.exe
-
Size
146KB
-
MD5
70835f6f2347215ea2c9351b68e7d226
-
SHA1
33d55b8e7374fda605c8ef5ec0612e01dfbbad78
-
SHA256
7c551c2816ea32d34c3f8ae27f272aa8f47db325e988e3ba58b4fc0e5cf9ca89
-
SHA512
527d7d32d4d32955efc0be9879b2396f3b47424b5f5fa9b8489a5cbcbdc1930208225581063e1dd5e69444beb8dcef0b0d20243586ef6c8ef9cab376b59a2258
-
SSDEEP
3072:Q72gILEswElQxOtpEwI+ZgId5Vk++QUUyO:Q7yLEsex62+6Gjy
Malware Config
Signatures
-
Detects Smokeloader packer 8 IoCs
resource yara_rule behavioral1/memory/3828-150-0x00000000022A0000-0x00000000022A9000-memory.dmp family_smokeloader behavioral1/memory/4780-174-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4780-145-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/4780-144-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4780-178-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2360-211-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/2360-242-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2360-243-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 4084 jibdbtd 2360 jibdbtd -
Deletes itself 1 IoCs
pid Process 3040 Process not Found -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3828 set thread context of 4780 3828 7c551c2816ea32d34c3f8ae27f272aa8f47db325e988e3ba58b4fc0e5cf9ca89.exe 66 PID 4084 set thread context of 2360 4084 jibdbtd 68 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7c551c2816ea32d34c3f8ae27f272aa8f47db325e988e3ba58b4fc0e5cf9ca89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jibdbtd Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jibdbtd Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jibdbtd Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7c551c2816ea32d34c3f8ae27f272aa8f47db325e988e3ba58b4fc0e5cf9ca89.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7c551c2816ea32d34c3f8ae27f272aa8f47db325e988e3ba58b4fc0e5cf9ca89.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4780 7c551c2816ea32d34c3f8ae27f272aa8f47db325e988e3ba58b4fc0e5cf9ca89.exe 4780 7c551c2816ea32d34c3f8ae27f272aa8f47db325e988e3ba58b4fc0e5cf9ca89.exe 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found 3040 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3040 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4780 7c551c2816ea32d34c3f8ae27f272aa8f47db325e988e3ba58b4fc0e5cf9ca89.exe 2360 jibdbtd -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3040 Process not Found Token: SeCreatePagefilePrivilege 3040 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3828 wrote to memory of 4780 3828 7c551c2816ea32d34c3f8ae27f272aa8f47db325e988e3ba58b4fc0e5cf9ca89.exe 66 PID 3828 wrote to memory of 4780 3828 7c551c2816ea32d34c3f8ae27f272aa8f47db325e988e3ba58b4fc0e5cf9ca89.exe 66 PID 3828 wrote to memory of 4780 3828 7c551c2816ea32d34c3f8ae27f272aa8f47db325e988e3ba58b4fc0e5cf9ca89.exe 66 PID 3828 wrote to memory of 4780 3828 7c551c2816ea32d34c3f8ae27f272aa8f47db325e988e3ba58b4fc0e5cf9ca89.exe 66 PID 3828 wrote to memory of 4780 3828 7c551c2816ea32d34c3f8ae27f272aa8f47db325e988e3ba58b4fc0e5cf9ca89.exe 66 PID 3828 wrote to memory of 4780 3828 7c551c2816ea32d34c3f8ae27f272aa8f47db325e988e3ba58b4fc0e5cf9ca89.exe 66 PID 4084 wrote to memory of 2360 4084 jibdbtd 68 PID 4084 wrote to memory of 2360 4084 jibdbtd 68 PID 4084 wrote to memory of 2360 4084 jibdbtd 68 PID 4084 wrote to memory of 2360 4084 jibdbtd 68 PID 4084 wrote to memory of 2360 4084 jibdbtd 68 PID 4084 wrote to memory of 2360 4084 jibdbtd 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c551c2816ea32d34c3f8ae27f272aa8f47db325e988e3ba58b4fc0e5cf9ca89.exe"C:\Users\Admin\AppData\Local\Temp\7c551c2816ea32d34c3f8ae27f272aa8f47db325e988e3ba58b4fc0e5cf9ca89.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\7c551c2816ea32d34c3f8ae27f272aa8f47db325e988e3ba58b4fc0e5cf9ca89.exe"C:\Users\Admin\AppData\Local\Temp\7c551c2816ea32d34c3f8ae27f272aa8f47db325e988e3ba58b4fc0e5cf9ca89.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4780
-
-
C:\Users\Admin\AppData\Roaming\jibdbtdC:\Users\Admin\AppData\Roaming\jibdbtd1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Roaming\jibdbtdC:\Users\Admin\AppData\Roaming\jibdbtd2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2360
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146KB
MD570835f6f2347215ea2c9351b68e7d226
SHA133d55b8e7374fda605c8ef5ec0612e01dfbbad78
SHA2567c551c2816ea32d34c3f8ae27f272aa8f47db325e988e3ba58b4fc0e5cf9ca89
SHA512527d7d32d4d32955efc0be9879b2396f3b47424b5f5fa9b8489a5cbcbdc1930208225581063e1dd5e69444beb8dcef0b0d20243586ef6c8ef9cab376b59a2258
-
Filesize
146KB
MD570835f6f2347215ea2c9351b68e7d226
SHA133d55b8e7374fda605c8ef5ec0612e01dfbbad78
SHA2567c551c2816ea32d34c3f8ae27f272aa8f47db325e988e3ba58b4fc0e5cf9ca89
SHA512527d7d32d4d32955efc0be9879b2396f3b47424b5f5fa9b8489a5cbcbdc1930208225581063e1dd5e69444beb8dcef0b0d20243586ef6c8ef9cab376b59a2258
-
Filesize
146KB
MD570835f6f2347215ea2c9351b68e7d226
SHA133d55b8e7374fda605c8ef5ec0612e01dfbbad78
SHA2567c551c2816ea32d34c3f8ae27f272aa8f47db325e988e3ba58b4fc0e5cf9ca89
SHA512527d7d32d4d32955efc0be9879b2396f3b47424b5f5fa9b8489a5cbcbdc1930208225581063e1dd5e69444beb8dcef0b0d20243586ef6c8ef9cab376b59a2258