Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
11/10/2022, 16:51
Static task
static1
Behavioral task
behavioral1
Sample
2e258c2a25553f479516852e18fccb6a133b0ee8c5483050621a57ee3c1e0567.exe
Resource
win10-20220812-en
General
-
Target
2e258c2a25553f479516852e18fccb6a133b0ee8c5483050621a57ee3c1e0567.exe
-
Size
216KB
-
MD5
f2982bf127b5847ab407d0e997b577cb
-
SHA1
d1dae5ac0e1794e9c3b122281bac43d5668accfb
-
SHA256
2e258c2a25553f479516852e18fccb6a133b0ee8c5483050621a57ee3c1e0567
-
SHA512
77483c5d24d13a5a2033008d20bde53cb77290b355b3e7cb536e53ae704afcb81bda468d176251015c79d3dff3bb94f31632bcc4b16532cda9b01252418f93aa
-
SSDEEP
3072:1PaPlOZEEWcLJKzyWt8tKa2GfOhjZxUeCrJY4Y2gm6wdkO:1yCNLJIylKa7faMeClYbwi
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/4792-151-0x00000000022C0000-0x00000000022C9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4848 AEAA.exe -
Deletes itself 1 IoCs
pid Process 2068 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2e258c2a25553f479516852e18fccb6a133b0ee8c5483050621a57ee3c1e0567.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2e258c2a25553f479516852e18fccb6a133b0ee8c5483050621a57ee3c1e0567.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2e258c2a25553f479516852e18fccb6a133b0ee8c5483050621a57ee3c1e0567.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4792 2e258c2a25553f479516852e18fccb6a133b0ee8c5483050621a57ee3c1e0567.exe 4792 2e258c2a25553f479516852e18fccb6a133b0ee8c5483050621a57ee3c1e0567.exe 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found 2068 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2068 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4792 2e258c2a25553f479516852e18fccb6a133b0ee8c5483050621a57ee3c1e0567.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2068 wrote to memory of 4848 2068 Process not Found 66 PID 2068 wrote to memory of 4848 2068 Process not Found 66 PID 2068 wrote to memory of 4848 2068 Process not Found 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e258c2a25553f479516852e18fccb6a133b0ee8c5483050621a57ee3c1e0567.exe"C:\Users\Admin\AppData\Local\Temp\2e258c2a25553f479516852e18fccb6a133b0ee8c5483050621a57ee3c1e0567.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4792
-
C:\Users\Admin\AppData\Local\Temp\AEAA.exeC:\Users\Admin\AppData\Local\Temp\AEAA.exe1⤵
- Executes dropped EXE
PID:4848
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5eadb3be4d3aed537549aa7e4e1ede5db
SHA1fc8064f80842090291840b04d7ef7551811e9af4
SHA256bb18e42c700a649d3cecc2e21d679c0b46568b6da06303e01e6b196203536d06
SHA5128ea649eea2960809b4465420670d214f5235533927cc334696eaa314f6d97fa162449979f4a1fd30c073dfc1c7cb116de408ad049dff9ad9c1ce48fcad588514
-
Filesize
1.3MB
MD5eadb3be4d3aed537549aa7e4e1ede5db
SHA1fc8064f80842090291840b04d7ef7551811e9af4
SHA256bb18e42c700a649d3cecc2e21d679c0b46568b6da06303e01e6b196203536d06
SHA5128ea649eea2960809b4465420670d214f5235533927cc334696eaa314f6d97fa162449979f4a1fd30c073dfc1c7cb116de408ad049dff9ad9c1ce48fcad588514