Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
02/11/2022, 22:38 UTC
Static task
static1
Behavioral task
behavioral1
Sample
5bde7fe5371b486bead101156b24e9a0c9a0b2d0b88f22a65f79d2776214636f.exe
Resource
win10-20220812-en
General
-
Target
5bde7fe5371b486bead101156b24e9a0c9a0b2d0b88f22a65f79d2776214636f.exe
-
Size
324KB
-
MD5
f290aec2c7924d760f140af9f86d386f
-
SHA1
8bee9fdddc29c3dc46f18cf3b80bee41e340de1a
-
SHA256
5bde7fe5371b486bead101156b24e9a0c9a0b2d0b88f22a65f79d2776214636f
-
SHA512
c87225bdd856cff1444701047d8ff44b1289236484c95a1fa3a77680f58ee959750d7cc59c9ada2a7ac5503ce8891bc27ec53935101d9b447eb8e2537cdba617
-
SSDEEP
3072:mt/IlLX3/EkiS56D+RyB1XNh1ZzVT7K5ejLVz1LZRiU/VggjcGkNIVqILr:C/KLX8PPbXzDVXK5cLV/t97ITsq
Malware Config
Signatures
-
Detects Smokeloader packer 8 IoCs
resource yara_rule behavioral1/memory/4124-150-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4124-151-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/4124-163-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4124-182-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4624-213-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/4668-219-0x0000000002D20000-0x0000000002D29000-memory.dmp family_smokeloader behavioral1/memory/4624-246-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4624-247-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 4668 ddbhhiu 4624 ddbhhiu -
Deletes itself 1 IoCs
pid Process 3056 Process not Found -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2664 set thread context of 4124 2664 5bde7fe5371b486bead101156b24e9a0c9a0b2d0b88f22a65f79d2776214636f.exe 66 PID 4668 set thread context of 4624 4668 ddbhhiu 68 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5bde7fe5371b486bead101156b24e9a0c9a0b2d0b88f22a65f79d2776214636f.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5bde7fe5371b486bead101156b24e9a0c9a0b2d0b88f22a65f79d2776214636f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ddbhhiu Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ddbhhiu Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ddbhhiu Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5bde7fe5371b486bead101156b24e9a0c9a0b2d0b88f22a65f79d2776214636f.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4124 5bde7fe5371b486bead101156b24e9a0c9a0b2d0b88f22a65f79d2776214636f.exe 4124 5bde7fe5371b486bead101156b24e9a0c9a0b2d0b88f22a65f79d2776214636f.exe 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found 3056 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3056 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4124 5bde7fe5371b486bead101156b24e9a0c9a0b2d0b88f22a65f79d2776214636f.exe 4624 ddbhhiu -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3056 Process not Found Token: SeCreatePagefilePrivilege 3056 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2664 wrote to memory of 4124 2664 5bde7fe5371b486bead101156b24e9a0c9a0b2d0b88f22a65f79d2776214636f.exe 66 PID 2664 wrote to memory of 4124 2664 5bde7fe5371b486bead101156b24e9a0c9a0b2d0b88f22a65f79d2776214636f.exe 66 PID 2664 wrote to memory of 4124 2664 5bde7fe5371b486bead101156b24e9a0c9a0b2d0b88f22a65f79d2776214636f.exe 66 PID 2664 wrote to memory of 4124 2664 5bde7fe5371b486bead101156b24e9a0c9a0b2d0b88f22a65f79d2776214636f.exe 66 PID 2664 wrote to memory of 4124 2664 5bde7fe5371b486bead101156b24e9a0c9a0b2d0b88f22a65f79d2776214636f.exe 66 PID 2664 wrote to memory of 4124 2664 5bde7fe5371b486bead101156b24e9a0c9a0b2d0b88f22a65f79d2776214636f.exe 66 PID 4668 wrote to memory of 4624 4668 ddbhhiu 68 PID 4668 wrote to memory of 4624 4668 ddbhhiu 68 PID 4668 wrote to memory of 4624 4668 ddbhhiu 68 PID 4668 wrote to memory of 4624 4668 ddbhhiu 68 PID 4668 wrote to memory of 4624 4668 ddbhhiu 68 PID 4668 wrote to memory of 4624 4668 ddbhhiu 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bde7fe5371b486bead101156b24e9a0c9a0b2d0b88f22a65f79d2776214636f.exe"C:\Users\Admin\AppData\Local\Temp\5bde7fe5371b486bead101156b24e9a0c9a0b2d0b88f22a65f79d2776214636f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\5bde7fe5371b486bead101156b24e9a0c9a0b2d0b88f22a65f79d2776214636f.exe"C:\Users\Admin\AppData\Local\Temp\5bde7fe5371b486bead101156b24e9a0c9a0b2d0b88f22a65f79d2776214636f.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4124
-
-
C:\Users\Admin\AppData\Roaming\ddbhhiuC:\Users\Admin\AppData\Roaming\ddbhhiu1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Roaming\ddbhhiuC:\Users\Admin\AppData\Roaming\ddbhhiu2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4624
-
Network
-
Remote address:8.8.8.8:53Requesthost-file-host6.comIN AResponsehost-file-host6.comIN A87.251.79.60
-
Remote address:87.251.79.60:80RequestPOST / HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://gbqvsqn.com/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 158
Host: host-file-host6.com
ResponseHTTP/1.1 200 OK
Date: Wed, 02 Nov 2022 22:39:29 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
-
Remote address:8.8.8.8:53Requesthost-host-file8.comIN AResponse
-
Remote address:8.8.8.8:53Requesthost-host-file8.comIN AResponse
-
Remote address:8.8.8.8:53Requesthost-host-file8.comIN AResponse
-
Remote address:8.8.8.8:53Requesthost-host-file8.comIN AResponse
-
322 B 7
-
699 B 402 B 6 5
HTTP Request
POST http://host-file-host6.com/HTTP Response
200 -
322 B 7
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
324KB
MD5f290aec2c7924d760f140af9f86d386f
SHA18bee9fdddc29c3dc46f18cf3b80bee41e340de1a
SHA2565bde7fe5371b486bead101156b24e9a0c9a0b2d0b88f22a65f79d2776214636f
SHA512c87225bdd856cff1444701047d8ff44b1289236484c95a1fa3a77680f58ee959750d7cc59c9ada2a7ac5503ce8891bc27ec53935101d9b447eb8e2537cdba617
-
Filesize
324KB
MD5f290aec2c7924d760f140af9f86d386f
SHA18bee9fdddc29c3dc46f18cf3b80bee41e340de1a
SHA2565bde7fe5371b486bead101156b24e9a0c9a0b2d0b88f22a65f79d2776214636f
SHA512c87225bdd856cff1444701047d8ff44b1289236484c95a1fa3a77680f58ee959750d7cc59c9ada2a7ac5503ce8891bc27ec53935101d9b447eb8e2537cdba617
-
Filesize
324KB
MD5f290aec2c7924d760f140af9f86d386f
SHA18bee9fdddc29c3dc46f18cf3b80bee41e340de1a
SHA2565bde7fe5371b486bead101156b24e9a0c9a0b2d0b88f22a65f79d2776214636f
SHA512c87225bdd856cff1444701047d8ff44b1289236484c95a1fa3a77680f58ee959750d7cc59c9ada2a7ac5503ce8891bc27ec53935101d9b447eb8e2537cdba617