Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
174s -
max time network
171s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
07/11/2022, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
9a941cff99433b69e172af8c97d2738a4c4846cd2f7dcf769bfa20f2c2dc21d9.exe
Resource
win10-20220812-en
General
-
Target
9a941cff99433b69e172af8c97d2738a4c4846cd2f7dcf769bfa20f2c2dc21d9.exe
-
Size
213KB
-
MD5
109b80dd2c58b3d11d2337a5b1e3c024
-
SHA1
6c60111cb3e687f8144d80a68dc0040215d55677
-
SHA256
9a941cff99433b69e172af8c97d2738a4c4846cd2f7dcf769bfa20f2c2dc21d9
-
SHA512
696f7623830e9923fb49328cce44d04591e9c02481af18c16fe1c656a3a50cab081e527c07e18dd350353f092c87090387bb37ff4afc5d4bf4bd1caf32f4a505
-
SSDEEP
3072:gaBNUcU5wjxV5LuWOjMrYN5QBPFv45ypI4N5aEWuThSY:guW6NLwMrxFv+4N5aEWuH
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/1916-144-0x00000000006B0000-0x00000000006B9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3068 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9a941cff99433b69e172af8c97d2738a4c4846cd2f7dcf769bfa20f2c2dc21d9.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9a941cff99433b69e172af8c97d2738a4c4846cd2f7dcf769bfa20f2c2dc21d9.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9a941cff99433b69e172af8c97d2738a4c4846cd2f7dcf769bfa20f2c2dc21d9.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1916 9a941cff99433b69e172af8c97d2738a4c4846cd2f7dcf769bfa20f2c2dc21d9.exe 1916 9a941cff99433b69e172af8c97d2738a4c4846cd2f7dcf769bfa20f2c2dc21d9.exe 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3068 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1916 9a941cff99433b69e172af8c97d2738a4c4846cd2f7dcf769bfa20f2c2dc21d9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a941cff99433b69e172af8c97d2738a4c4846cd2f7dcf769bfa20f2c2dc21d9.exe"C:\Users\Admin\AppData\Local\Temp\9a941cff99433b69e172af8c97d2738a4c4846cd2f7dcf769bfa20f2c2dc21d9.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1916