Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
271s -
max time network
287s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 23:39
Static task
static1
Behavioral task
behavioral1
Sample
85babae9d92830e5e66989c0334690108dc5ea99f5c0fcbb31a0cfa91482f0ef.exe
Resource
win10v2004-20221111-en
General
-
Target
85babae9d92830e5e66989c0334690108dc5ea99f5c0fcbb31a0cfa91482f0ef.exe
-
Size
167KB
-
MD5
4a64d7d703c6884e6eb5ba5df8454c09
-
SHA1
8e74eca90f1c440ba882bb71754aea5a8705b569
-
SHA256
85babae9d92830e5e66989c0334690108dc5ea99f5c0fcbb31a0cfa91482f0ef
-
SHA512
db59b8bb52534e101a85e99819a7cd17da4ae4ad38cd62acae0fab0b651ffcc87ad6f6d30387ce49cd8e6c1e9cf33bcc17156145354684a71b4e26607009e963
-
SSDEEP
3072:hRouTQ9KWS0KEVu5fHd39r+0hmpeQ/X+b9CPYVxG:hpc80KEG939Zh02hoYVw
Malware Config
Signatures
-
Detects Smokeloader packer 2 IoCs
resource yara_rule behavioral1/memory/1288-133-0x0000000002440000-0x0000000002449000-memory.dmp family_smokeloader behavioral1/memory/1288-136-0x0000000002440000-0x0000000002449000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 85babae9d92830e5e66989c0334690108dc5ea99f5c0fcbb31a0cfa91482f0ef.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 85babae9d92830e5e66989c0334690108dc5ea99f5c0fcbb31a0cfa91482f0ef.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 85babae9d92830e5e66989c0334690108dc5ea99f5c0fcbb31a0cfa91482f0ef.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1288 85babae9d92830e5e66989c0334690108dc5ea99f5c0fcbb31a0cfa91482f0ef.exe 1288 85babae9d92830e5e66989c0334690108dc5ea99f5c0fcbb31a0cfa91482f0ef.exe 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1300 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1288 85babae9d92830e5e66989c0334690108dc5ea99f5c0fcbb31a0cfa91482f0ef.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeShutdownPrivilege 1300 Process not Found Token: SeCreatePagefilePrivilege 1300 Process not Found Token: SeShutdownPrivilege 1300 Process not Found Token: SeCreatePagefilePrivilege 1300 Process not Found Token: SeShutdownPrivilege 1300 Process not Found Token: SeCreatePagefilePrivilege 1300 Process not Found Token: SeShutdownPrivilege 1300 Process not Found Token: SeCreatePagefilePrivilege 1300 Process not Found Token: SeShutdownPrivilege 1300 Process not Found Token: SeCreatePagefilePrivilege 1300 Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\85babae9d92830e5e66989c0334690108dc5ea99f5c0fcbb31a0cfa91482f0ef.exe"C:\Users\Admin\AppData\Local\Temp\85babae9d92830e5e66989c0334690108dc5ea99f5c0fcbb31a0cfa91482f0ef.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1288