Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
169s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
05/12/2022, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
2784656be7dfda4cfb448c900f5f45e9f12ed6f1fc6e4c06b7ab4cfe352e5e8f.exe
Resource
win10-20220812-en
General
-
Target
2784656be7dfda4cfb448c900f5f45e9f12ed6f1fc6e4c06b7ab4cfe352e5e8f.exe
-
Size
273KB
-
MD5
7ceff8f9ededc7722631f45f096e3f0d
-
SHA1
e635e691bac842c631f8345cb91676d8cb2d2eff
-
SHA256
2784656be7dfda4cfb448c900f5f45e9f12ed6f1fc6e4c06b7ab4cfe352e5e8f
-
SHA512
fdcc595910565d42c74b4dfc277f64034c15727e42aee1c82575ec8f9554bf19bbc574982e57ebdc4855402d362d5cd1dce1a72b626203e2f04f1ce4f50a369c
-
SSDEEP
3072:s5XVntm0Y5KD5MHts5bWv57892siOTK159ySgP8pFviVRvJTcphNzPYgV2qs646:sdkHS5H9WO+J3gEfvIDcThVS
Malware Config
Signatures
-
Detects Smokeloader packer 4 IoCs
resource yara_rule behavioral1/memory/4376-149-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4376-150-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/4376-169-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4376-181-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3036 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2732 set thread context of 4376 2732 2784656be7dfda4cfb448c900f5f45e9f12ed6f1fc6e4c06b7ab4cfe352e5e8f.exe 67 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2784656be7dfda4cfb448c900f5f45e9f12ed6f1fc6e4c06b7ab4cfe352e5e8f.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2784656be7dfda4cfb448c900f5f45e9f12ed6f1fc6e4c06b7ab4cfe352e5e8f.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2784656be7dfda4cfb448c900f5f45e9f12ed6f1fc6e4c06b7ab4cfe352e5e8f.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4376 2784656be7dfda4cfb448c900f5f45e9f12ed6f1fc6e4c06b7ab4cfe352e5e8f.exe 4376 2784656be7dfda4cfb448c900f5f45e9f12ed6f1fc6e4c06b7ab4cfe352e5e8f.exe 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3036 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4376 2784656be7dfda4cfb448c900f5f45e9f12ed6f1fc6e4c06b7ab4cfe352e5e8f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2732 wrote to memory of 4376 2732 2784656be7dfda4cfb448c900f5f45e9f12ed6f1fc6e4c06b7ab4cfe352e5e8f.exe 67 PID 2732 wrote to memory of 4376 2732 2784656be7dfda4cfb448c900f5f45e9f12ed6f1fc6e4c06b7ab4cfe352e5e8f.exe 67 PID 2732 wrote to memory of 4376 2732 2784656be7dfda4cfb448c900f5f45e9f12ed6f1fc6e4c06b7ab4cfe352e5e8f.exe 67 PID 2732 wrote to memory of 4376 2732 2784656be7dfda4cfb448c900f5f45e9f12ed6f1fc6e4c06b7ab4cfe352e5e8f.exe 67 PID 2732 wrote to memory of 4376 2732 2784656be7dfda4cfb448c900f5f45e9f12ed6f1fc6e4c06b7ab4cfe352e5e8f.exe 67 PID 2732 wrote to memory of 4376 2732 2784656be7dfda4cfb448c900f5f45e9f12ed6f1fc6e4c06b7ab4cfe352e5e8f.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\2784656be7dfda4cfb448c900f5f45e9f12ed6f1fc6e4c06b7ab4cfe352e5e8f.exe"C:\Users\Admin\AppData\Local\Temp\2784656be7dfda4cfb448c900f5f45e9f12ed6f1fc6e4c06b7ab4cfe352e5e8f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\2784656be7dfda4cfb448c900f5f45e9f12ed6f1fc6e4c06b7ab4cfe352e5e8f.exe"C:\Users\Admin\AppData\Local\Temp\2784656be7dfda4cfb448c900f5f45e9f12ed6f1fc6e4c06b7ab4cfe352e5e8f.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4376
-