Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
14/10/2022, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
f11571cfbdb3a9e3bec31b8d95c61345a9f5db1e01b176db6b5acf01bd2bf7f6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f11571cfbdb3a9e3bec31b8d95c61345a9f5db1e01b176db6b5acf01bd2bf7f6.exe
Resource
win10v2004-20220812-en
General
-
Target
f11571cfbdb3a9e3bec31b8d95c61345a9f5db1e01b176db6b5acf01bd2bf7f6.exe
-
Size
215KB
-
MD5
97d58537589e3a7dc3acf4122eb5da32
-
SHA1
a9cf2f95373f375c93fda6efd6be4e7a9f51f5bb
-
SHA256
f11571cfbdb3a9e3bec31b8d95c61345a9f5db1e01b176db6b5acf01bd2bf7f6
-
SHA512
cca1ca24c0c875352d20d3ccb9038889cc9e14be42bd430ea84005f06f628bf10175063fd0d2d48990e821a54421302f8de6216283f38c574ae2fa002c4335ad
-
SSDEEP
3072:QPIPq2ZEwvyeeL/i5nkFBt8WGzS5z8EnKH1b6bCXk373fO:QrmYL/iZCH8EEObCXk3r
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/1964-56-0x0000000000220000-0x0000000000229000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f11571cfbdb3a9e3bec31b8d95c61345a9f5db1e01b176db6b5acf01bd2bf7f6.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f11571cfbdb3a9e3bec31b8d95c61345a9f5db1e01b176db6b5acf01bd2bf7f6.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f11571cfbdb3a9e3bec31b8d95c61345a9f5db1e01b176db6b5acf01bd2bf7f6.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1964 f11571cfbdb3a9e3bec31b8d95c61345a9f5db1e01b176db6b5acf01bd2bf7f6.exe 1964 f11571cfbdb3a9e3bec31b8d95c61345a9f5db1e01b176db6b5acf01bd2bf7f6.exe 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1964 f11571cfbdb3a9e3bec31b8d95c61345a9f5db1e01b176db6b5acf01bd2bf7f6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f11571cfbdb3a9e3bec31b8d95c61345a9f5db1e01b176db6b5acf01bd2bf7f6.exe"C:\Users\Admin\AppData\Local\Temp\f11571cfbdb3a9e3bec31b8d95c61345a9f5db1e01b176db6b5acf01bd2bf7f6.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1964