Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2022, 08:08
Static task
static1
Behavioral task
behavioral1
Sample
22783419a663e831a3df01cd2170794b30821591d9d126b95f79fb35eb4a30a8.exe
Resource
win10v2004-20221111-en
General
-
Target
22783419a663e831a3df01cd2170794b30821591d9d126b95f79fb35eb4a30a8.exe
-
Size
331KB
-
MD5
d5cb751a943d89d06ff9c564b56f3a08
-
SHA1
5efcb9e5ec242fa60b5be595a931c9e6dcc54984
-
SHA256
22783419a663e831a3df01cd2170794b30821591d9d126b95f79fb35eb4a30a8
-
SHA512
3eb1144f5f6f2ece75549406333d4af77fbeb69ae8751e800564aa6a55a6933a34f713f91d3a19748e4f5dc541ba65d9394cf98ba17bbe2d35688135e3474062
-
SSDEEP
6144:wiY9LnLXmb35KWFV+xO+4z274Q7sh161hJFIJfVAVrwU+:LM7ibBFV+U+4z274ph16PHgtyQ
Malware Config
Signatures
-
Detects Smokeloader packer 6 IoCs
resource yara_rule behavioral1/memory/4900-133-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4972-135-0x00000000005D0000-0x00000000005D9000-memory.dmp family_smokeloader behavioral1/memory/4900-136-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4900-137-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4576-144-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4576-145-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 4512 wrubrwe 4576 wrubrwe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4972 set thread context of 4900 4972 22783419a663e831a3df01cd2170794b30821591d9d126b95f79fb35eb4a30a8.exe 80 PID 4512 set thread context of 4576 4512 wrubrwe 89 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wrubrwe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wrubrwe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 22783419a663e831a3df01cd2170794b30821591d9d126b95f79fb35eb4a30a8.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 22783419a663e831a3df01cd2170794b30821591d9d126b95f79fb35eb4a30a8.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 22783419a663e831a3df01cd2170794b30821591d9d126b95f79fb35eb4a30a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wrubrwe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4900 22783419a663e831a3df01cd2170794b30821591d9d126b95f79fb35eb4a30a8.exe 4900 22783419a663e831a3df01cd2170794b30821591d9d126b95f79fb35eb4a30a8.exe 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3020 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4900 22783419a663e831a3df01cd2170794b30821591d9d126b95f79fb35eb4a30a8.exe 4576 wrubrwe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4972 wrote to memory of 4900 4972 22783419a663e831a3df01cd2170794b30821591d9d126b95f79fb35eb4a30a8.exe 80 PID 4972 wrote to memory of 4900 4972 22783419a663e831a3df01cd2170794b30821591d9d126b95f79fb35eb4a30a8.exe 80 PID 4972 wrote to memory of 4900 4972 22783419a663e831a3df01cd2170794b30821591d9d126b95f79fb35eb4a30a8.exe 80 PID 4972 wrote to memory of 4900 4972 22783419a663e831a3df01cd2170794b30821591d9d126b95f79fb35eb4a30a8.exe 80 PID 4972 wrote to memory of 4900 4972 22783419a663e831a3df01cd2170794b30821591d9d126b95f79fb35eb4a30a8.exe 80 PID 4972 wrote to memory of 4900 4972 22783419a663e831a3df01cd2170794b30821591d9d126b95f79fb35eb4a30a8.exe 80 PID 4512 wrote to memory of 4576 4512 wrubrwe 89 PID 4512 wrote to memory of 4576 4512 wrubrwe 89 PID 4512 wrote to memory of 4576 4512 wrubrwe 89 PID 4512 wrote to memory of 4576 4512 wrubrwe 89 PID 4512 wrote to memory of 4576 4512 wrubrwe 89 PID 4512 wrote to memory of 4576 4512 wrubrwe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\22783419a663e831a3df01cd2170794b30821591d9d126b95f79fb35eb4a30a8.exe"C:\Users\Admin\AppData\Local\Temp\22783419a663e831a3df01cd2170794b30821591d9d126b95f79fb35eb4a30a8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\22783419a663e831a3df01cd2170794b30821591d9d126b95f79fb35eb4a30a8.exe"C:\Users\Admin\AppData\Local\Temp\22783419a663e831a3df01cd2170794b30821591d9d126b95f79fb35eb4a30a8.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4900
-
-
C:\Users\Admin\AppData\Roaming\wrubrweC:\Users\Admin\AppData\Roaming\wrubrwe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Roaming\wrubrweC:\Users\Admin\AppData\Roaming\wrubrwe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4576
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
331KB
MD5d5cb751a943d89d06ff9c564b56f3a08
SHA15efcb9e5ec242fa60b5be595a931c9e6dcc54984
SHA25622783419a663e831a3df01cd2170794b30821591d9d126b95f79fb35eb4a30a8
SHA5123eb1144f5f6f2ece75549406333d4af77fbeb69ae8751e800564aa6a55a6933a34f713f91d3a19748e4f5dc541ba65d9394cf98ba17bbe2d35688135e3474062
-
Filesize
331KB
MD5d5cb751a943d89d06ff9c564b56f3a08
SHA15efcb9e5ec242fa60b5be595a931c9e6dcc54984
SHA25622783419a663e831a3df01cd2170794b30821591d9d126b95f79fb35eb4a30a8
SHA5123eb1144f5f6f2ece75549406333d4af77fbeb69ae8751e800564aa6a55a6933a34f713f91d3a19748e4f5dc541ba65d9394cf98ba17bbe2d35688135e3474062
-
Filesize
331KB
MD5d5cb751a943d89d06ff9c564b56f3a08
SHA15efcb9e5ec242fa60b5be595a931c9e6dcc54984
SHA25622783419a663e831a3df01cd2170794b30821591d9d126b95f79fb35eb4a30a8
SHA5123eb1144f5f6f2ece75549406333d4af77fbeb69ae8751e800564aa6a55a6933a34f713f91d3a19748e4f5dc541ba65d9394cf98ba17bbe2d35688135e3474062