Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    08/10/2022, 13:42

General

  • Target

    690b6f69c4c6c01b8b5f8d0a36a7ef4668e36ba04841dbf1ca3960bb175b59df.exe

  • Size

    269KB

  • MD5

    4e9cc495267fa3bdbd1dd96081c0d56b

  • SHA1

    2297cded497c13745f6141f198d805fc6f5d0298

  • SHA256

    690b6f69c4c6c01b8b5f8d0a36a7ef4668e36ba04841dbf1ca3960bb175b59df

  • SHA512

    a86ca58952fc987149bf7494845a6137adf7b1548288eed04c6d5d2a2c9c478fb7b913d01f6a2beab9fbe363df9770c1237387c49443594c85481be8677688fa

  • SSDEEP

    6144:opB+xQMCpg3Q7Zz2JOCn0P3fWQ4iruMqrFnerwVfeXO:opo4pgh0vuQaneL

Malware Config

Signatures

  • Detects Smokeloader packer 5 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\690b6f69c4c6c01b8b5f8d0a36a7ef4668e36ba04841dbf1ca3960bb175b59df.exe
    "C:\Users\Admin\AppData\Local\Temp\690b6f69c4c6c01b8b5f8d0a36a7ef4668e36ba04841dbf1ca3960bb175b59df.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4328
    • C:\Users\Admin\AppData\Local\Temp\690b6f69c4c6c01b8b5f8d0a36a7ef4668e36ba04841dbf1ca3960bb175b59df.exe
      "C:\Users\Admin\AppData\Local\Temp\690b6f69c4c6c01b8b5f8d0a36a7ef4668e36ba04841dbf1ca3960bb175b59df.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:4008

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4008-162-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-168-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-181-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4008-180-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-179-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-178-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-177-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-176-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-175-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-174-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-173-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-172-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-171-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-170-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-169-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-151-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-149-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4008-152-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-166-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4008-167-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-165-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-164-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-163-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-161-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-160-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-159-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-158-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-157-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-156-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-155-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-154-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-153-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-136-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-133-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-119-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-148-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-147-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-146-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-145-0x0000000002020000-0x0000000002029000-memory.dmp

    Filesize

    36KB

  • memory/4328-144-0x0000000000540000-0x000000000068A000-memory.dmp

    Filesize

    1.3MB

  • memory/4328-143-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-142-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-141-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-139-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-118-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-138-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-135-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-137-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-134-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-132-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-131-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-130-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-129-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-128-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-127-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-126-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-125-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-124-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-123-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-122-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-121-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB

  • memory/4328-120-0x00000000776D0000-0x000000007785E000-memory.dmp

    Filesize

    1.6MB