Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/12/2022, 16:35

General

  • Target

    2e6bea0f83ebe6b4a523b65774c5b256cecdd866dfa85497f7c7f52769906b63.exe

  • Size

    229KB

  • MD5

    c8319250371b63dba3aa715ba1d942f5

  • SHA1

    89b5f7790b6a393a4e645989049938da6a791ce0

  • SHA256

    2e6bea0f83ebe6b4a523b65774c5b256cecdd866dfa85497f7c7f52769906b63

  • SHA512

    0511c56aedb0dfe9c4bb8a96fa3f07cd174901d1240b880a459819f41d2eb54d381113d872801c39f19e37c3765f2d012a35461bea2fb1308340072acaa2c8d6

  • SSDEEP

    3072:8Aw/1CLeTjtUpIyATSpWCwvC7RotTzXtAhu+oukzDV1vWBkOuRGK:o9CLIOpQupWjCOtT7tAIuk11vpjcK

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 17 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 26 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e6bea0f83ebe6b4a523b65774c5b256cecdd866dfa85497f7c7f52769906b63.exe
    "C:\Users\Admin\AppData\Local\Temp\2e6bea0f83ebe6b4a523b65774c5b256cecdd866dfa85497f7c7f52769906b63.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4696
  • C:\Users\Admin\AppData\Local\Temp\EE0E.exe
    C:\Users\Admin\AppData\Local\Temp\EE0E.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Oyiesauffusw.tmp",Wuuitfqhpt
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:2120
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 17103
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:4492
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:3628
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:3432
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 528
          2⤵
          • Program crash
          PID:1512
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2792 -ip 2792
        1⤵
          PID:3808
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:4416

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\EE0E.exe

            Filesize

            1.0MB

            MD5

            46ed908fd15d8ef90aac5aeab58c73b2

            SHA1

            bf2e893778b82590f00fc0d20fd39486dfe32bc3

            SHA256

            80fe8bd5a77f553a6f68750da9eab56175ee41a59aa48aa1d16cb05fe141db25

            SHA512

            5ae75d9b3d93a0819a6386541722e5bb5c0851fe2b7e6e7c7c1741e943e370e71ae226a2691641e303e5babf9cb3fefe834989fd4642b8e30d3a50008c18b10a

          • C:\Users\Admin\AppData\Local\Temp\EE0E.exe

            Filesize

            1.0MB

            MD5

            46ed908fd15d8ef90aac5aeab58c73b2

            SHA1

            bf2e893778b82590f00fc0d20fd39486dfe32bc3

            SHA256

            80fe8bd5a77f553a6f68750da9eab56175ee41a59aa48aa1d16cb05fe141db25

            SHA512

            5ae75d9b3d93a0819a6386541722e5bb5c0851fe2b7e6e7c7c1741e943e370e71ae226a2691641e303e5babf9cb3fefe834989fd4642b8e30d3a50008c18b10a

          • C:\Users\Admin\AppData\Local\Temp\Oyiesauffusw.tmp

            Filesize

            730KB

            MD5

            8d039a703875733043526555982e4e60

            SHA1

            f583795e790e682db2feaa5f5b8d282216f581e2

            SHA256

            5cb8e52b000f84494627db8e8e700e7731c9bfa2eb9e6a8a8280d2311327e81a

            SHA512

            3e89ec3eb7e90aa93c0a3cc2d120521b1c2236a8a2169b2654fcc153f926b97e85267a177ef92f3ac3a7aa493a81a3a55c1b6b56ef8f8beb93b78bf3eb10373e

          • C:\Users\Admin\AppData\Local\Temp\Oyiesauffusw.tmp

            Filesize

            730KB

            MD5

            8d039a703875733043526555982e4e60

            SHA1

            f583795e790e682db2feaa5f5b8d282216f581e2

            SHA256

            5cb8e52b000f84494627db8e8e700e7731c9bfa2eb9e6a8a8280d2311327e81a

            SHA512

            3e89ec3eb7e90aa93c0a3cc2d120521b1c2236a8a2169b2654fcc153f926b97e85267a177ef92f3ac3a7aa493a81a3a55c1b6b56ef8f8beb93b78bf3eb10373e

          • memory/2120-146-0x00000000050F0000-0x0000000005C52000-memory.dmp

            Filesize

            11.4MB

          • memory/2120-147-0x0000000004A90000-0x0000000004BD0000-memory.dmp

            Filesize

            1.2MB

          • memory/2120-159-0x00000000050F0000-0x0000000005C52000-memory.dmp

            Filesize

            11.4MB

          • memory/2120-152-0x0000000004A90000-0x0000000004BD0000-memory.dmp

            Filesize

            1.2MB

          • memory/2120-151-0x0000000004A90000-0x0000000004BD0000-memory.dmp

            Filesize

            1.2MB

          • memory/2120-150-0x00000000069B0000-0x0000000006AF0000-memory.dmp

            Filesize

            1.2MB

          • memory/2120-149-0x00000000069B0000-0x0000000006AF0000-memory.dmp

            Filesize

            1.2MB

          • memory/2120-148-0x0000000004A90000-0x0000000004BD0000-memory.dmp

            Filesize

            1.2MB

          • memory/2120-145-0x00000000050F0000-0x0000000005C52000-memory.dmp

            Filesize

            11.4MB

          • memory/2792-143-0x0000000002300000-0x000000000241C000-memory.dmp

            Filesize

            1.1MB

          • memory/2792-144-0x0000000000400000-0x000000000052B000-memory.dmp

            Filesize

            1.2MB

          • memory/2792-142-0x0000000000A76000-0x0000000000B53000-memory.dmp

            Filesize

            884KB

          • memory/4492-155-0x0000000000190000-0x000000000042A000-memory.dmp

            Filesize

            2.6MB

          • memory/4492-154-0x000001FA14480000-0x000001FA145C0000-memory.dmp

            Filesize

            1.2MB

          • memory/4492-156-0x000001FA14480000-0x000001FA145C0000-memory.dmp

            Filesize

            1.2MB

          • memory/4492-157-0x000001FA145F0000-0x000001FA1489C000-memory.dmp

            Filesize

            2.7MB

          • memory/4492-161-0x000001FA145F0000-0x000001FA1489C000-memory.dmp

            Filesize

            2.7MB

          • memory/4696-132-0x00000000004A7000-0x00000000004B8000-memory.dmp

            Filesize

            68KB

          • memory/4696-134-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/4696-135-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/4696-133-0x0000000000460000-0x0000000000469000-memory.dmp

            Filesize

            36KB