Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/10/2022, 00:48
Static task
static1
Behavioral task
behavioral1
Sample
715b64fe6d295af97dc23676fd41978b09614c5bd78194151ed8066350ff0299.exe
Resource
win10v2004-20220812-en
General
-
Target
715b64fe6d295af97dc23676fd41978b09614c5bd78194151ed8066350ff0299.exe
-
Size
220KB
-
MD5
07ccf82355aa0f7c864429c757d9d8ba
-
SHA1
7f15f044a8607d4671b7dd054500bd047de6f630
-
SHA256
715b64fe6d295af97dc23676fd41978b09614c5bd78194151ed8066350ff0299
-
SHA512
a7850cd16234c6543038930d9601c78ccd8a68482d35679ee10844b080d93c595a63e3930393f39b21495630b86321efc95aa612ed5e84cc3d59bd40e6ca873c
-
SSDEEP
3072:53205dVETW/rWLLTLsws6H5LXQkGxH0XMidzyf424ew8UVhQbo/7FB8eSe:53TJmLTPsMQkGxH6Mityf+eIVhh77Y
Malware Config
Signatures
-
Detects Smokeloader packer 6 IoCs
resource yara_rule behavioral1/memory/2764-133-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/536-135-0x00000000001F0000-0x00000000001F9000-memory.dmp family_smokeloader behavioral1/memory/2764-136-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2764-137-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3396-144-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3396-145-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 1508 estritg 3396 estritg -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 536 set thread context of 2764 536 715b64fe6d295af97dc23676fd41978b09614c5bd78194151ed8066350ff0299.exe 81 PID 1508 set thread context of 3396 1508 estritg 90 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 715b64fe6d295af97dc23676fd41978b09614c5bd78194151ed8066350ff0299.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 715b64fe6d295af97dc23676fd41978b09614c5bd78194151ed8066350ff0299.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 715b64fe6d295af97dc23676fd41978b09614c5bd78194151ed8066350ff0299.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI estritg Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI estritg Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI estritg -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2764 715b64fe6d295af97dc23676fd41978b09614c5bd78194151ed8066350ff0299.exe 2764 715b64fe6d295af97dc23676fd41978b09614c5bd78194151ed8066350ff0299.exe 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found 2484 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2484 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2764 715b64fe6d295af97dc23676fd41978b09614c5bd78194151ed8066350ff0299.exe 3396 estritg -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2484 Process not Found Token: SeCreatePagefilePrivilege 2484 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 536 wrote to memory of 2764 536 715b64fe6d295af97dc23676fd41978b09614c5bd78194151ed8066350ff0299.exe 81 PID 536 wrote to memory of 2764 536 715b64fe6d295af97dc23676fd41978b09614c5bd78194151ed8066350ff0299.exe 81 PID 536 wrote to memory of 2764 536 715b64fe6d295af97dc23676fd41978b09614c5bd78194151ed8066350ff0299.exe 81 PID 536 wrote to memory of 2764 536 715b64fe6d295af97dc23676fd41978b09614c5bd78194151ed8066350ff0299.exe 81 PID 536 wrote to memory of 2764 536 715b64fe6d295af97dc23676fd41978b09614c5bd78194151ed8066350ff0299.exe 81 PID 536 wrote to memory of 2764 536 715b64fe6d295af97dc23676fd41978b09614c5bd78194151ed8066350ff0299.exe 81 PID 1508 wrote to memory of 3396 1508 estritg 90 PID 1508 wrote to memory of 3396 1508 estritg 90 PID 1508 wrote to memory of 3396 1508 estritg 90 PID 1508 wrote to memory of 3396 1508 estritg 90 PID 1508 wrote to memory of 3396 1508 estritg 90 PID 1508 wrote to memory of 3396 1508 estritg 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\715b64fe6d295af97dc23676fd41978b09614c5bd78194151ed8066350ff0299.exe"C:\Users\Admin\AppData\Local\Temp\715b64fe6d295af97dc23676fd41978b09614c5bd78194151ed8066350ff0299.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\715b64fe6d295af97dc23676fd41978b09614c5bd78194151ed8066350ff0299.exe"C:\Users\Admin\AppData\Local\Temp\715b64fe6d295af97dc23676fd41978b09614c5bd78194151ed8066350ff0299.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2764
-
-
C:\Users\Admin\AppData\Roaming\estritgC:\Users\Admin\AppData\Roaming\estritg1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Roaming\estritgC:\Users\Admin\AppData\Roaming\estritg2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3396
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD507ccf82355aa0f7c864429c757d9d8ba
SHA17f15f044a8607d4671b7dd054500bd047de6f630
SHA256715b64fe6d295af97dc23676fd41978b09614c5bd78194151ed8066350ff0299
SHA512a7850cd16234c6543038930d9601c78ccd8a68482d35679ee10844b080d93c595a63e3930393f39b21495630b86321efc95aa612ed5e84cc3d59bd40e6ca873c
-
Filesize
220KB
MD507ccf82355aa0f7c864429c757d9d8ba
SHA17f15f044a8607d4671b7dd054500bd047de6f630
SHA256715b64fe6d295af97dc23676fd41978b09614c5bd78194151ed8066350ff0299
SHA512a7850cd16234c6543038930d9601c78ccd8a68482d35679ee10844b080d93c595a63e3930393f39b21495630b86321efc95aa612ed5e84cc3d59bd40e6ca873c
-
Filesize
220KB
MD507ccf82355aa0f7c864429c757d9d8ba
SHA17f15f044a8607d4671b7dd054500bd047de6f630
SHA256715b64fe6d295af97dc23676fd41978b09614c5bd78194151ed8066350ff0299
SHA512a7850cd16234c6543038930d9601c78ccd8a68482d35679ee10844b080d93c595a63e3930393f39b21495630b86321efc95aa612ed5e84cc3d59bd40e6ca873c