Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03/01/2023, 01:17 UTC

General

  • Target

    6e43498b0c00513823bc30f866a0a55c2d187b1b2ef83cfbe8bc2065c9d95a95.exe

  • Size

    215KB

  • MD5

    8f167e41b86d0b7e424fc734d9a33d68

  • SHA1

    fb44ccf8819673390e453cd0f91aaf1f800395b2

  • SHA256

    6e43498b0c00513823bc30f866a0a55c2d187b1b2ef83cfbe8bc2065c9d95a95

  • SHA512

    eeaba95454f593c552428ef8ef5b4eb5d77508d2d457e71c9a94b8b5e631bd712b3a31921c87676a699bab173a7051c6ff75f5db6ffe8138e2f4a24c5123278f

  • SSDEEP

    3072:nXMDIJI0L4PkPTf54ko9ebfyPrihwKtC88CbC5GxIds/HnpW6:X7JbL5Tmiy+hbtC8hEs/HB

Malware Config

Signatures

  • Detects Smokeloader packer 5 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of SetThreadContext 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e43498b0c00513823bc30f866a0a55c2d187b1b2ef83cfbe8bc2065c9d95a95.exe
    "C:\Users\Admin\AppData\Local\Temp\6e43498b0c00513823bc30f866a0a55c2d187b1b2ef83cfbe8bc2065c9d95a95.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Users\Admin\AppData\Local\Temp\6e43498b0c00513823bc30f866a0a55c2d187b1b2ef83cfbe8bc2065c9d95a95.exe
      "C:\Users\Admin\AppData\Local\Temp\6e43498b0c00513823bc30f866a0a55c2d187b1b2ef83cfbe8bc2065c9d95a95.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1252

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/852-58-0x0000000000230000-0x0000000000239000-memory.dmp

    Filesize

    36KB

  • memory/852-56-0x000000000058B000-0x000000000059C000-memory.dmp

    Filesize

    68KB

  • memory/1252-54-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1252-57-0x0000000074DA1000-0x0000000074DA3000-memory.dmp

    Filesize

    8KB

  • memory/1252-59-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1252-60-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.