Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
53s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
23/12/2022, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
42662392f30a35f68a739190efbc1df0c13cdd3258bd5f1ba9b01e829b5a2a71.exe
Resource
win10-20220812-en
General
-
Target
42662392f30a35f68a739190efbc1df0c13cdd3258bd5f1ba9b01e829b5a2a71.exe
-
Size
228KB
-
MD5
6605e6f473dfe74773348d44cb040c75
-
SHA1
87f8b117a68f300b731a8f8a7c332e2e3c18ca95
-
SHA256
42662392f30a35f68a739190efbc1df0c13cdd3258bd5f1ba9b01e829b5a2a71
-
SHA512
4237e21f3c4054ffb4544df2cc87d02dc791f3527bfd313e3e3df3d258a2b38bf60248adc84a73d24f10a2c83ce434502af91b51e468f564dfb8f53a90916f47
-
SSDEEP
3072:VeELifif5LoRyMlidTbYG4UEH90Qu+oukzFZMRGIWBkOuRGK:wEL0RNyGUEd0pukIGIpjcK
Malware Config
Signatures
-
Detects Smokeloader packer 4 IoCs
resource yara_rule behavioral1/memory/5104-149-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/5104-150-0x0000000000402DD8-mapping.dmp family_smokeloader behavioral1/memory/5104-167-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/5104-181-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3152 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2248 set thread context of 5104 2248 42662392f30a35f68a739190efbc1df0c13cdd3258bd5f1ba9b01e829b5a2a71.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 42662392f30a35f68a739190efbc1df0c13cdd3258bd5f1ba9b01e829b5a2a71.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 42662392f30a35f68a739190efbc1df0c13cdd3258bd5f1ba9b01e829b5a2a71.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 42662392f30a35f68a739190efbc1df0c13cdd3258bd5f1ba9b01e829b5a2a71.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5104 42662392f30a35f68a739190efbc1df0c13cdd3258bd5f1ba9b01e829b5a2a71.exe 5104 42662392f30a35f68a739190efbc1df0c13cdd3258bd5f1ba9b01e829b5a2a71.exe 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found 3152 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3152 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5104 42662392f30a35f68a739190efbc1df0c13cdd3258bd5f1ba9b01e829b5a2a71.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2248 wrote to memory of 5104 2248 42662392f30a35f68a739190efbc1df0c13cdd3258bd5f1ba9b01e829b5a2a71.exe 66 PID 2248 wrote to memory of 5104 2248 42662392f30a35f68a739190efbc1df0c13cdd3258bd5f1ba9b01e829b5a2a71.exe 66 PID 2248 wrote to memory of 5104 2248 42662392f30a35f68a739190efbc1df0c13cdd3258bd5f1ba9b01e829b5a2a71.exe 66 PID 2248 wrote to memory of 5104 2248 42662392f30a35f68a739190efbc1df0c13cdd3258bd5f1ba9b01e829b5a2a71.exe 66 PID 2248 wrote to memory of 5104 2248 42662392f30a35f68a739190efbc1df0c13cdd3258bd5f1ba9b01e829b5a2a71.exe 66 PID 2248 wrote to memory of 5104 2248 42662392f30a35f68a739190efbc1df0c13cdd3258bd5f1ba9b01e829b5a2a71.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\42662392f30a35f68a739190efbc1df0c13cdd3258bd5f1ba9b01e829b5a2a71.exe"C:\Users\Admin\AppData\Local\Temp\42662392f30a35f68a739190efbc1df0c13cdd3258bd5f1ba9b01e829b5a2a71.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\42662392f30a35f68a739190efbc1df0c13cdd3258bd5f1ba9b01e829b5a2a71.exe"C:\Users\Admin\AppData\Local\Temp\42662392f30a35f68a739190efbc1df0c13cdd3258bd5f1ba9b01e829b5a2a71.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5104
-