Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
18/12/2022, 15:32
Static task
static1
Behavioral task
behavioral1
Sample
78284c9f117c387050311cd0a08d695ca8b1136b0db2f45397a04f1ac5a9a250.exe
Resource
win10-20220812-en
General
-
Target
78284c9f117c387050311cd0a08d695ca8b1136b0db2f45397a04f1ac5a9a250.exe
-
Size
214KB
-
MD5
906d61684a9994d7e338ffbde12a77cc
-
SHA1
d4e08cd8096504aca9a01dfae631de580b3da365
-
SHA256
78284c9f117c387050311cd0a08d695ca8b1136b0db2f45397a04f1ac5a9a250
-
SHA512
2952dee399886f2b82463eb69eba02b30c29dab0efd1883b826cd2804497fd30b2536cea3cf8d2acb42065be6f3a47dcc567f38917bfdf9b754988f2bf4f9a06
-
SSDEEP
6144:UkJLPvkxjs9QVO/+ywvE+JHq8TjlVklPH:UkJjcNsuVO/CECflU
Malware Config
Extracted
danabot
23.236.181.126:443
123.253.35.251:443
66.85.173.3:443
-
embedded_hash
8F56CD73F6B5CD5D7B17B0BA61E70A82
-
type
loader
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/1004-141-0x00000000001E0000-0x00000000001E9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 988 E024.exe -
Deletes itself 1 IoCs
pid Process 2556 Process not Found -
Loads dropped DLL 1 IoCs
pid Process 2568 rundll32.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 78284c9f117c387050311cd0a08d695ca8b1136b0db2f45397a04f1ac5a9a250.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 78284c9f117c387050311cd0a08d695ca8b1136b0db2f45397a04f1ac5a9a250.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 78284c9f117c387050311cd0a08d695ca8b1136b0db2f45397a04f1ac5a9a250.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1004 78284c9f117c387050311cd0a08d695ca8b1136b0db2f45397a04f1ac5a9a250.exe 1004 78284c9f117c387050311cd0a08d695ca8b1136b0db2f45397a04f1ac5a9a250.exe 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found 2556 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2556 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1004 78284c9f117c387050311cd0a08d695ca8b1136b0db2f45397a04f1ac5a9a250.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2556 Process not Found Token: SeCreatePagefilePrivilege 2556 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2556 wrote to memory of 988 2556 Process not Found 66 PID 2556 wrote to memory of 988 2556 Process not Found 66 PID 2556 wrote to memory of 988 2556 Process not Found 66 PID 988 wrote to memory of 2568 988 E024.exe 67 PID 988 wrote to memory of 2568 988 E024.exe 67 PID 988 wrote to memory of 2568 988 E024.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\78284c9f117c387050311cd0a08d695ca8b1136b0db2f45397a04f1ac5a9a250.exe"C:\Users\Admin\AppData\Local\Temp\78284c9f117c387050311cd0a08d695ca8b1136b0db2f45397a04f1ac5a9a250.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1004
-
C:\Users\Admin\AppData\Local\Temp\E024.exeC:\Users\Admin\AppData\Local\Temp\E024.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Iseiuaqptde.dll,start2⤵
- Loads dropped DLL
PID:2568
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD573d6902d621eaf39531d4115dd5ec524
SHA1e9a1c23b79add277750b5063e67544f599cdbe54
SHA256ca8d37d3714da79fd3a4819840061dc744315738abb6767768ba6adb93f3bc25
SHA512b66ba42c23bc0e125b2dc341984ab3def9e639a4aa250eadf56bf6e4b4b85861f925e992905f9162f19e5e27b046f4d36464fe11b3bda3473b1a7cae7b9dca07
-
Filesize
2.4MB
MD573d6902d621eaf39531d4115dd5ec524
SHA1e9a1c23b79add277750b5063e67544f599cdbe54
SHA256ca8d37d3714da79fd3a4819840061dc744315738abb6767768ba6adb93f3bc25
SHA512b66ba42c23bc0e125b2dc341984ab3def9e639a4aa250eadf56bf6e4b4b85861f925e992905f9162f19e5e27b046f4d36464fe11b3bda3473b1a7cae7b9dca07
-
Filesize
2.4MB
MD5e4efd81cb4b298c079d3b66d771b55d7
SHA1c8debc36eed530cf2c22d3f1f5a5ec5ca38a6f67
SHA25669d293c0aabdefa030e2f9356edbf3334c8d5a93e50b0826724cecfa9b21462e
SHA51221395cebbb27a607268355e6b778b16764987d47057429dd81859e32aaaddc4c43701af803d571ac02f9eb9870b511a090a84e98a6199ddab93543d830f6f82f
-
Filesize
2.4MB
MD5e4efd81cb4b298c079d3b66d771b55d7
SHA1c8debc36eed530cf2c22d3f1f5a5ec5ca38a6f67
SHA25669d293c0aabdefa030e2f9356edbf3334c8d5a93e50b0826724cecfa9b21462e
SHA51221395cebbb27a607268355e6b778b16764987d47057429dd81859e32aaaddc4c43701af803d571ac02f9eb9870b511a090a84e98a6199ddab93543d830f6f82f