Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
08/10/2022, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
dbdc011d4b9e4aa241b067902c0719d6645250411bb31b9ac376b50e6627a387.exe
Resource
win10-20220812-en
General
-
Target
dbdc011d4b9e4aa241b067902c0719d6645250411bb31b9ac376b50e6627a387.exe
-
Size
268KB
-
MD5
10a68449db6c148bde2a91aec07b327a
-
SHA1
4d2fb416ac5779af6a89116b2bb8b13181aee650
-
SHA256
dbdc011d4b9e4aa241b067902c0719d6645250411bb31b9ac376b50e6627a387
-
SHA512
d01d4245cc6689125b5fd65baf83c5749fb1392fbb09fe99763bada26c21af48025ad571be440b9e3c62c4c64edc3936742243fa2c37b753a313a68dfc774359
-
SSDEEP
3072:AXK6qB+sjver8F/24XrIIHga5icStE9mPEd0jLQarqBqPuqHLCseYnM/h3qpZa96:0VqB+sjy4rIIwREdyUJLrsNnrwVfXQ
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/1788-155-0x0000000000570000-0x0000000000579000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
pid Process 1948 C719.exe 4968 CE3E.exe 5088 E31E.exe 3628 dvwbrtc 4912 770.exe 4560 770.exe 4544 770.exe 4484 770.exe 4460 770.exe -
Deletes itself 1 IoCs
pid Process 3024 Process not Found -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4912 set thread context of 4460 4912 770.exe 81 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dbdc011d4b9e4aa241b067902c0719d6645250411bb31b9ac376b50e6627a387.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dbdc011d4b9e4aa241b067902c0719d6645250411bb31b9ac376b50e6627a387.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dbdc011d4b9e4aa241b067902c0719d6645250411bb31b9ac376b50e6627a387.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dvwbrtc Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dvwbrtc Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dvwbrtc -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1788 dbdc011d4b9e4aa241b067902c0719d6645250411bb31b9ac376b50e6627a387.exe 1788 dbdc011d4b9e4aa241b067902c0719d6645250411bb31b9ac376b50e6627a387.exe 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3024 Process not Found -
Suspicious behavior: MapViewOfSection 20 IoCs
pid Process 1788 dbdc011d4b9e4aa241b067902c0719d6645250411bb31b9ac376b50e6627a387.exe 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3628 dvwbrtc -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeDebugPrivilege 4912 770.exe Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3024 wrote to memory of 1948 3024 Process not Found 66 PID 3024 wrote to memory of 1948 3024 Process not Found 66 PID 3024 wrote to memory of 1948 3024 Process not Found 66 PID 3024 wrote to memory of 4968 3024 Process not Found 68 PID 3024 wrote to memory of 4968 3024 Process not Found 68 PID 3024 wrote to memory of 4968 3024 Process not Found 68 PID 3024 wrote to memory of 5088 3024 Process not Found 70 PID 3024 wrote to memory of 5088 3024 Process not Found 70 PID 3024 wrote to memory of 5088 3024 Process not Found 70 PID 3024 wrote to memory of 4912 3024 Process not Found 73 PID 3024 wrote to memory of 4912 3024 Process not Found 73 PID 3024 wrote to memory of 3004 3024 Process not Found 74 PID 3024 wrote to memory of 3004 3024 Process not Found 74 PID 3024 wrote to memory of 3004 3024 Process not Found 74 PID 3024 wrote to memory of 3004 3024 Process not Found 74 PID 3024 wrote to memory of 756 3024 Process not Found 75 PID 3024 wrote to memory of 756 3024 Process not Found 75 PID 3024 wrote to memory of 756 3024 Process not Found 75 PID 3024 wrote to memory of 3376 3024 Process not Found 76 PID 3024 wrote to memory of 3376 3024 Process not Found 76 PID 3024 wrote to memory of 3376 3024 Process not Found 76 PID 3024 wrote to memory of 3376 3024 Process not Found 76 PID 3024 wrote to memory of 3984 3024 Process not Found 77 PID 3024 wrote to memory of 3984 3024 Process not Found 77 PID 3024 wrote to memory of 3984 3024 Process not Found 77 PID 4912 wrote to memory of 4560 4912 770.exe 78 PID 4912 wrote to memory of 4560 4912 770.exe 78 PID 4912 wrote to memory of 4544 4912 770.exe 79 PID 4912 wrote to memory of 4544 4912 770.exe 79 PID 3024 wrote to memory of 4452 3024 Process not Found 80 PID 3024 wrote to memory of 4452 3024 Process not Found 80 PID 3024 wrote to memory of 4452 3024 Process not Found 80 PID 3024 wrote to memory of 4452 3024 Process not Found 80 PID 4912 wrote to memory of 4484 4912 770.exe 82 PID 4912 wrote to memory of 4484 4912 770.exe 82 PID 4912 wrote to memory of 4460 4912 770.exe 81 PID 4912 wrote to memory of 4460 4912 770.exe 81 PID 4912 wrote to memory of 4460 4912 770.exe 81 PID 4912 wrote to memory of 4460 4912 770.exe 81 PID 4912 wrote to memory of 4460 4912 770.exe 81 PID 4912 wrote to memory of 4460 4912 770.exe 81 PID 4912 wrote to memory of 4460 4912 770.exe 81 PID 4912 wrote to memory of 4460 4912 770.exe 81 PID 4912 wrote to memory of 4460 4912 770.exe 81 PID 4912 wrote to memory of 4460 4912 770.exe 81 PID 4912 wrote to memory of 4460 4912 770.exe 81 PID 4912 wrote to memory of 4460 4912 770.exe 81 PID 4912 wrote to memory of 4460 4912 770.exe 81 PID 4912 wrote to memory of 4460 4912 770.exe 81 PID 4912 wrote to memory of 4460 4912 770.exe 81 PID 3024 wrote to memory of 3752 3024 Process not Found 83 PID 3024 wrote to memory of 3752 3024 Process not Found 83 PID 3024 wrote to memory of 3752 3024 Process not Found 83 PID 3024 wrote to memory of 3752 3024 Process not Found 83 PID 3024 wrote to memory of 672 3024 Process not Found 84 PID 3024 wrote to memory of 672 3024 Process not Found 84 PID 3024 wrote to memory of 672 3024 Process not Found 84 PID 3024 wrote to memory of 672 3024 Process not Found 84 PID 3024 wrote to memory of 316 3024 Process not Found 85 PID 3024 wrote to memory of 316 3024 Process not Found 85 PID 3024 wrote to memory of 316 3024 Process not Found 85 PID 3024 wrote to memory of 2452 3024 Process not Found 86 PID 3024 wrote to memory of 2452 3024 Process not Found 86 PID 3024 wrote to memory of 2452 3024 Process not Found 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbdc011d4b9e4aa241b067902c0719d6645250411bb31b9ac376b50e6627a387.exe"C:\Users\Admin\AppData\Local\Temp\dbdc011d4b9e4aa241b067902c0719d6645250411bb31b9ac376b50e6627a387.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1788
-
C:\Users\Admin\AppData\Local\Temp\C719.exeC:\Users\Admin\AppData\Local\Temp\C719.exe1⤵
- Executes dropped EXE
PID:1948
-
C:\Users\Admin\AppData\Local\Temp\CE3E.exeC:\Users\Admin\AppData\Local\Temp\CE3E.exe1⤵
- Executes dropped EXE
PID:4968
-
C:\Users\Admin\AppData\Local\Temp\E31E.exeC:\Users\Admin\AppData\Local\Temp\E31E.exe1⤵
- Executes dropped EXE
PID:5088
-
C:\Users\Admin\AppData\Roaming\dvwbrtcC:\Users\Admin\AppData\Roaming\dvwbrtc1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3628
-
C:\Users\Admin\AppData\Local\Temp\770.exeC:\Users\Admin\AppData\Local\Temp\770.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\770.exeC:\Users\Admin\AppData\Local\Temp\770.exe2⤵
- Executes dropped EXE
PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\770.exeC:\Users\Admin\AppData\Local\Temp\770.exe2⤵
- Executes dropped EXE
PID:4544
-
-
C:\Users\Admin\AppData\Local\Temp\770.exeC:\Users\Admin\AppData\Local\Temp\770.exe2⤵
- Executes dropped EXE
PID:4460 -
C:\Windows\system32\cmd.execmd.exe /c "del C:\Users\Admin\AppData\Local\Temp\770.exe"3⤵PID:1044
-
-
-
C:\Users\Admin\AppData\Local\Temp\770.exeC:\Users\Admin\AppData\Local\Temp\770.exe2⤵
- Executes dropped EXE
PID:4484
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3004
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:756
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3376
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3984
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4452
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3752
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:672
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:316
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2452
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.0MB
MD5734bcc186e1d9a484b6a6cd3f1a08b01
SHA13eeae6a7870b644e567bfac5c827c3694d2abff2
SHA2566204442688609c7641b6ac67f4b99c3288c52c643842be79ee081cfdbcb8c65d
SHA512a02459e06de6ac8d2ba8541b01fe17a99a3db6b199ff76451c1ad1f170451c671a6d759a8cd8f5aaf641a80f9882dd4cdd0b400c300ab4e05e342e574e4755a8
-
Filesize
8.0MB
MD5734bcc186e1d9a484b6a6cd3f1a08b01
SHA13eeae6a7870b644e567bfac5c827c3694d2abff2
SHA2566204442688609c7641b6ac67f4b99c3288c52c643842be79ee081cfdbcb8c65d
SHA512a02459e06de6ac8d2ba8541b01fe17a99a3db6b199ff76451c1ad1f170451c671a6d759a8cd8f5aaf641a80f9882dd4cdd0b400c300ab4e05e342e574e4755a8
-
Filesize
8.0MB
MD5734bcc186e1d9a484b6a6cd3f1a08b01
SHA13eeae6a7870b644e567bfac5c827c3694d2abff2
SHA2566204442688609c7641b6ac67f4b99c3288c52c643842be79ee081cfdbcb8c65d
SHA512a02459e06de6ac8d2ba8541b01fe17a99a3db6b199ff76451c1ad1f170451c671a6d759a8cd8f5aaf641a80f9882dd4cdd0b400c300ab4e05e342e574e4755a8
-
Filesize
8.0MB
MD5734bcc186e1d9a484b6a6cd3f1a08b01
SHA13eeae6a7870b644e567bfac5c827c3694d2abff2
SHA2566204442688609c7641b6ac67f4b99c3288c52c643842be79ee081cfdbcb8c65d
SHA512a02459e06de6ac8d2ba8541b01fe17a99a3db6b199ff76451c1ad1f170451c671a6d759a8cd8f5aaf641a80f9882dd4cdd0b400c300ab4e05e342e574e4755a8
-
Filesize
8.0MB
MD5734bcc186e1d9a484b6a6cd3f1a08b01
SHA13eeae6a7870b644e567bfac5c827c3694d2abff2
SHA2566204442688609c7641b6ac67f4b99c3288c52c643842be79ee081cfdbcb8c65d
SHA512a02459e06de6ac8d2ba8541b01fe17a99a3db6b199ff76451c1ad1f170451c671a6d759a8cd8f5aaf641a80f9882dd4cdd0b400c300ab4e05e342e574e4755a8
-
Filesize
8.0MB
MD5734bcc186e1d9a484b6a6cd3f1a08b01
SHA13eeae6a7870b644e567bfac5c827c3694d2abff2
SHA2566204442688609c7641b6ac67f4b99c3288c52c643842be79ee081cfdbcb8c65d
SHA512a02459e06de6ac8d2ba8541b01fe17a99a3db6b199ff76451c1ad1f170451c671a6d759a8cd8f5aaf641a80f9882dd4cdd0b400c300ab4e05e342e574e4755a8
-
Filesize
720KB
MD5b3a393d426846aa21f0107ea59cbec3e
SHA1d7eb462a5978eb683759cc5f12fe29e92c1bd53c
SHA256ce185d38dab15db73e1ab7f4513244941669bae2d8ac5b0fa886c35423e64031
SHA512feb9a58a413f0c3a83c26e5cc290eb1c797af76d46079e2121b5293d6043ad2a1dee81bdc7c62b2eaa3a246b73e9a38631c0bca359e938bdb2b19cedd14f1a3c
-
Filesize
720KB
MD5b3a393d426846aa21f0107ea59cbec3e
SHA1d7eb462a5978eb683759cc5f12fe29e92c1bd53c
SHA256ce185d38dab15db73e1ab7f4513244941669bae2d8ac5b0fa886c35423e64031
SHA512feb9a58a413f0c3a83c26e5cc290eb1c797af76d46079e2121b5293d6043ad2a1dee81bdc7c62b2eaa3a246b73e9a38631c0bca359e938bdb2b19cedd14f1a3c
-
Filesize
783KB
MD56485e193cc4811e8b8f27a2903ebc605
SHA1c7e8c5dacdf81d44863500a92be8bcc3704f48c7
SHA2562d4f8ea22e17368c2950129396c94b753072b22789afb0351b74411e22cb061e
SHA51223d0b43a93669ba76eb4d890dfb09b04ef3f6524f8779cb6715019663c21b395927b19318b8a537c8d62719c3f61e4d0cffc97a818a9988313ad822ec3f3466d
-
Filesize
783KB
MD56485e193cc4811e8b8f27a2903ebc605
SHA1c7e8c5dacdf81d44863500a92be8bcc3704f48c7
SHA2562d4f8ea22e17368c2950129396c94b753072b22789afb0351b74411e22cb061e
SHA51223d0b43a93669ba76eb4d890dfb09b04ef3f6524f8779cb6715019663c21b395927b19318b8a537c8d62719c3f61e4d0cffc97a818a9988313ad822ec3f3466d
-
Filesize
720KB
MD52cd90f03ec11ae903f821a18c9538c52
SHA11f94a7e26b5ed3ee334784e0ca7a97f145ad3a20
SHA256885e4af5d272a989a44e8ce0ce6a5d4d3441823b9ed1f3721df45de0ee2fdd09
SHA512d9deffd5af159e65a7aee5c440d988e3cd39e721cbdf36ae05c261aa6f6187a5817a55811ac5b18e570045feb96d9ed104aa2b72d6253408d78341581a69cd47
-
Filesize
720KB
MD52cd90f03ec11ae903f821a18c9538c52
SHA11f94a7e26b5ed3ee334784e0ca7a97f145ad3a20
SHA256885e4af5d272a989a44e8ce0ce6a5d4d3441823b9ed1f3721df45de0ee2fdd09
SHA512d9deffd5af159e65a7aee5c440d988e3cd39e721cbdf36ae05c261aa6f6187a5817a55811ac5b18e570045feb96d9ed104aa2b72d6253408d78341581a69cd47
-
Filesize
268KB
MD510a68449db6c148bde2a91aec07b327a
SHA14d2fb416ac5779af6a89116b2bb8b13181aee650
SHA256dbdc011d4b9e4aa241b067902c0719d6645250411bb31b9ac376b50e6627a387
SHA512d01d4245cc6689125b5fd65baf83c5749fb1392fbb09fe99763bada26c21af48025ad571be440b9e3c62c4c64edc3936742243fa2c37b753a313a68dfc774359
-
Filesize
268KB
MD510a68449db6c148bde2a91aec07b327a
SHA14d2fb416ac5779af6a89116b2bb8b13181aee650
SHA256dbdc011d4b9e4aa241b067902c0719d6645250411bb31b9ac376b50e6627a387
SHA512d01d4245cc6689125b5fd65baf83c5749fb1392fbb09fe99763bada26c21af48025ad571be440b9e3c62c4c64edc3936742243fa2c37b753a313a68dfc774359