Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2022, 11:58
Static task
static1
Behavioral task
behavioral1
Sample
a7ad095285082e5d842734b4ed7051ba1db97f50192341facadf976cda7933f6.exe
Resource
win10v2004-20221111-en
General
-
Target
a7ad095285082e5d842734b4ed7051ba1db97f50192341facadf976cda7933f6.exe
-
Size
249KB
-
MD5
ee432a705afd8a1885aae1e8cbf48bbd
-
SHA1
5b41eef4ee6b9fd04feb2819c356b6bb140af9ae
-
SHA256
a7ad095285082e5d842734b4ed7051ba1db97f50192341facadf976cda7933f6
-
SHA512
209d99e777fb2a4ca3d297e93d7015d41eb00d352d5b14d8b1fa1dcf16bb1812c99dc830028c12706a1ee016992a6f01c92ed6f0978f597469b103b06e805375
-
SSDEEP
3072:cj2RYTBHLsd+0RZJVGB7egAnmFcvxhpdJm6y36LU8y5/LU8y5kDB6xuqqb53y1tz:LY1HLsIAtnA6pdjy6o5o+cx3E5
Malware Config
Signatures
-
Detects Smokeloader packer 6 IoCs
resource yara_rule behavioral1/memory/4412-133-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4180-135-0x00000000007F0000-0x00000000007F9000-memory.dmp family_smokeloader behavioral1/memory/4412-136-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4412-137-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2780-144-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2780-145-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 1732 wugjjsu 2780 wugjjsu -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4180 set thread context of 4412 4180 a7ad095285082e5d842734b4ed7051ba1db97f50192341facadf976cda7933f6.exe 84 PID 1732 set thread context of 2780 1732 wugjjsu 91 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wugjjsu Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a7ad095285082e5d842734b4ed7051ba1db97f50192341facadf976cda7933f6.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a7ad095285082e5d842734b4ed7051ba1db97f50192341facadf976cda7933f6.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a7ad095285082e5d842734b4ed7051ba1db97f50192341facadf976cda7933f6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wugjjsu Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wugjjsu -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4412 a7ad095285082e5d842734b4ed7051ba1db97f50192341facadf976cda7933f6.exe 4412 a7ad095285082e5d842734b4ed7051ba1db97f50192341facadf976cda7933f6.exe 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found 2600 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2600 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4412 a7ad095285082e5d842734b4ed7051ba1db97f50192341facadf976cda7933f6.exe 2780 wugjjsu -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2600 Process not Found Token: SeCreatePagefilePrivilege 2600 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4180 wrote to memory of 4412 4180 a7ad095285082e5d842734b4ed7051ba1db97f50192341facadf976cda7933f6.exe 84 PID 4180 wrote to memory of 4412 4180 a7ad095285082e5d842734b4ed7051ba1db97f50192341facadf976cda7933f6.exe 84 PID 4180 wrote to memory of 4412 4180 a7ad095285082e5d842734b4ed7051ba1db97f50192341facadf976cda7933f6.exe 84 PID 4180 wrote to memory of 4412 4180 a7ad095285082e5d842734b4ed7051ba1db97f50192341facadf976cda7933f6.exe 84 PID 4180 wrote to memory of 4412 4180 a7ad095285082e5d842734b4ed7051ba1db97f50192341facadf976cda7933f6.exe 84 PID 4180 wrote to memory of 4412 4180 a7ad095285082e5d842734b4ed7051ba1db97f50192341facadf976cda7933f6.exe 84 PID 1732 wrote to memory of 2780 1732 wugjjsu 91 PID 1732 wrote to memory of 2780 1732 wugjjsu 91 PID 1732 wrote to memory of 2780 1732 wugjjsu 91 PID 1732 wrote to memory of 2780 1732 wugjjsu 91 PID 1732 wrote to memory of 2780 1732 wugjjsu 91 PID 1732 wrote to memory of 2780 1732 wugjjsu 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7ad095285082e5d842734b4ed7051ba1db97f50192341facadf976cda7933f6.exe"C:\Users\Admin\AppData\Local\Temp\a7ad095285082e5d842734b4ed7051ba1db97f50192341facadf976cda7933f6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\a7ad095285082e5d842734b4ed7051ba1db97f50192341facadf976cda7933f6.exe"C:\Users\Admin\AppData\Local\Temp\a7ad095285082e5d842734b4ed7051ba1db97f50192341facadf976cda7933f6.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4412
-
-
C:\Users\Admin\AppData\Roaming\wugjjsuC:\Users\Admin\AppData\Roaming\wugjjsu1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Roaming\wugjjsuC:\Users\Admin\AppData\Roaming\wugjjsu2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2780
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
249KB
MD5ee432a705afd8a1885aae1e8cbf48bbd
SHA15b41eef4ee6b9fd04feb2819c356b6bb140af9ae
SHA256a7ad095285082e5d842734b4ed7051ba1db97f50192341facadf976cda7933f6
SHA512209d99e777fb2a4ca3d297e93d7015d41eb00d352d5b14d8b1fa1dcf16bb1812c99dc830028c12706a1ee016992a6f01c92ed6f0978f597469b103b06e805375
-
Filesize
249KB
MD5ee432a705afd8a1885aae1e8cbf48bbd
SHA15b41eef4ee6b9fd04feb2819c356b6bb140af9ae
SHA256a7ad095285082e5d842734b4ed7051ba1db97f50192341facadf976cda7933f6
SHA512209d99e777fb2a4ca3d297e93d7015d41eb00d352d5b14d8b1fa1dcf16bb1812c99dc830028c12706a1ee016992a6f01c92ed6f0978f597469b103b06e805375
-
Filesize
249KB
MD5ee432a705afd8a1885aae1e8cbf48bbd
SHA15b41eef4ee6b9fd04feb2819c356b6bb140af9ae
SHA256a7ad095285082e5d842734b4ed7051ba1db97f50192341facadf976cda7933f6
SHA512209d99e777fb2a4ca3d297e93d7015d41eb00d352d5b14d8b1fa1dcf16bb1812c99dc830028c12706a1ee016992a6f01c92ed6f0978f597469b103b06e805375