Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
26/10/2022, 10:27
Static task
static1
Behavioral task
behavioral1
Sample
cb2ee077dae92931c48a7517bcd7f3e8cbbf30125b32eeec0eb9b1478369bbca.exe
Resource
win10-20220812-en
General
-
Target
cb2ee077dae92931c48a7517bcd7f3e8cbbf30125b32eeec0eb9b1478369bbca.exe
-
Size
216KB
-
MD5
25904484d382fb8f47abfb76b6f3a346
-
SHA1
30e232616e35d6a511a8aeab5efd46a579395b16
-
SHA256
cb2ee077dae92931c48a7517bcd7f3e8cbbf30125b32eeec0eb9b1478369bbca
-
SHA512
a31d9ff44e2387d141debe3597b7a3c5963023cbef72a5ba197441b8aad2fbfd7d4a8af8189601fe5d247b60656508f67c8f684657568c54a7d6b702ffa8db8b
-
SSDEEP
3072:XNChgWID6B4KpLviiE1Q57ZxSQY/erqm250tex:XMh3dLaiE1QxSvQqm2SY
Malware Config
Signatures
-
Detects Smokeloader packer 5 IoCs
resource yara_rule behavioral1/memory/4672-140-0x0000000000680000-0x0000000000689000-memory.dmp family_smokeloader behavioral1/memory/1972-144-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/1972-145-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/1972-166-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/1972-177-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 2988 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4672 set thread context of 1972 4672 cb2ee077dae92931c48a7517bcd7f3e8cbbf30125b32eeec0eb9b1478369bbca.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cb2ee077dae92931c48a7517bcd7f3e8cbbf30125b32eeec0eb9b1478369bbca.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cb2ee077dae92931c48a7517bcd7f3e8cbbf30125b32eeec0eb9b1478369bbca.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cb2ee077dae92931c48a7517bcd7f3e8cbbf30125b32eeec0eb9b1478369bbca.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1972 cb2ee077dae92931c48a7517bcd7f3e8cbbf30125b32eeec0eb9b1478369bbca.exe 1972 cb2ee077dae92931c48a7517bcd7f3e8cbbf30125b32eeec0eb9b1478369bbca.exe 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found 2988 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2988 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1972 cb2ee077dae92931c48a7517bcd7f3e8cbbf30125b32eeec0eb9b1478369bbca.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4672 wrote to memory of 1972 4672 cb2ee077dae92931c48a7517bcd7f3e8cbbf30125b32eeec0eb9b1478369bbca.exe 66 PID 4672 wrote to memory of 1972 4672 cb2ee077dae92931c48a7517bcd7f3e8cbbf30125b32eeec0eb9b1478369bbca.exe 66 PID 4672 wrote to memory of 1972 4672 cb2ee077dae92931c48a7517bcd7f3e8cbbf30125b32eeec0eb9b1478369bbca.exe 66 PID 4672 wrote to memory of 1972 4672 cb2ee077dae92931c48a7517bcd7f3e8cbbf30125b32eeec0eb9b1478369bbca.exe 66 PID 4672 wrote to memory of 1972 4672 cb2ee077dae92931c48a7517bcd7f3e8cbbf30125b32eeec0eb9b1478369bbca.exe 66 PID 4672 wrote to memory of 1972 4672 cb2ee077dae92931c48a7517bcd7f3e8cbbf30125b32eeec0eb9b1478369bbca.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb2ee077dae92931c48a7517bcd7f3e8cbbf30125b32eeec0eb9b1478369bbca.exe"C:\Users\Admin\AppData\Local\Temp\cb2ee077dae92931c48a7517bcd7f3e8cbbf30125b32eeec0eb9b1478369bbca.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\cb2ee077dae92931c48a7517bcd7f3e8cbbf30125b32eeec0eb9b1478369bbca.exe"C:\Users\Admin\AppData\Local\Temp\cb2ee077dae92931c48a7517bcd7f3e8cbbf30125b32eeec0eb9b1478369bbca.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1972
-