Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/01/2023, 18:42

General

  • Target

    2795b73571413607ff6ff9a4a5f2cd6e959a3f71871613f186074e956bc61047.exe

  • Size

    278KB

  • MD5

    76a4ecb125c564dabebfddeb7edbb0ec

  • SHA1

    044a090032f05e33db53403474f3d5a8c4587ad9

  • SHA256

    2795b73571413607ff6ff9a4a5f2cd6e959a3f71871613f186074e956bc61047

  • SHA512

    2f8a1fb2a3135a14945af1c31af28c27a1a8092efe862b2913a3a5893055480d0318c06cd43ba4e0da06b1c3113602f787f0e5e0b727bc2da2f58798c5260a78

  • SSDEEP

    6144:g1yLR5LsWUwGQXgnAQH7lmRHlW7/JonEmQLr:gUXAxwGq4AQbKHW/mE7

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 25 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2795b73571413607ff6ff9a4a5f2cd6e959a3f71871613f186074e956bc61047.exe
    "C:\Users\Admin\AppData\Local\Temp\2795b73571413607ff6ff9a4a5f2cd6e959a3f71871613f186074e956bc61047.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4280
  • C:\Users\Admin\AppData\Local\Temp\2192.exe
    C:\Users\Admin\AppData\Local\Temp\2192.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Ryfererfh.tmp",Fwpthq
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 22795
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:644
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 540
      2⤵
      • Program crash
      PID:32
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1476 -ip 1476
    1⤵
      PID:4260
    • C:\Users\Admin\AppData\Local\Temp\51CA.exe
      C:\Users\Admin\AppData\Local\Temp\51CA.exe
      1⤵
      • Executes dropped EXE
      PID:3420
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3420 -s 1352
        2⤵
        • Program crash
        PID:1012
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3420 -ip 3420
      1⤵
        PID:4688
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:4584

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\2192.exe

          Filesize

          1.1MB

          MD5

          46f93418e2a2de0bae996469ce62dca6

          SHA1

          33c88b545f25eef5f106a9a1a60e0fa65da93e43

          SHA256

          db84faedd982ee6eacf754814d5bfeb0f67ebb367794774b616911d4d1b73840

          SHA512

          3c2fdf6278610f57d96150a3ddbc424bbb9cd3c536cdf64d814a5520c71ffc2c4b34111c2212aa304d3376f223c86c0547b635eb5c0b95df0bddc459fc1452c4

        • C:\Users\Admin\AppData\Local\Temp\2192.exe

          Filesize

          1.1MB

          MD5

          46f93418e2a2de0bae996469ce62dca6

          SHA1

          33c88b545f25eef5f106a9a1a60e0fa65da93e43

          SHA256

          db84faedd982ee6eacf754814d5bfeb0f67ebb367794774b616911d4d1b73840

          SHA512

          3c2fdf6278610f57d96150a3ddbc424bbb9cd3c536cdf64d814a5520c71ffc2c4b34111c2212aa304d3376f223c86c0547b635eb5c0b95df0bddc459fc1452c4

        • C:\Users\Admin\AppData\Local\Temp\51CA.exe

          Filesize

          316KB

          MD5

          b68dfe0e3d589ab7f641dcf572d79804

          SHA1

          091d26d00c9a6015a3efb6962951bd7ecea4cd1c

          SHA256

          489e40adf6ea56661d025658dc6fdcf040ce45f8a36482d5f9c8292840335da8

          SHA512

          59cccfc7e249a1c7923880403edaf892667f43d4763f6165f151021854575af52aadb94cd186363147d345959dc6c542b3688a6fdcd19a0e2db91c9ef7790744

        • C:\Users\Admin\AppData\Local\Temp\51CA.exe

          Filesize

          316KB

          MD5

          b68dfe0e3d589ab7f641dcf572d79804

          SHA1

          091d26d00c9a6015a3efb6962951bd7ecea4cd1c

          SHA256

          489e40adf6ea56661d025658dc6fdcf040ce45f8a36482d5f9c8292840335da8

          SHA512

          59cccfc7e249a1c7923880403edaf892667f43d4763f6165f151021854575af52aadb94cd186363147d345959dc6c542b3688a6fdcd19a0e2db91c9ef7790744

        • C:\Users\Admin\AppData\Local\Temp\Ryfererfh.tmp

          Filesize

          817KB

          MD5

          0a6c58fc386c9a4d7d43b809447f3eac

          SHA1

          b07d0ae1180e21bf79b3b720d9e03e2b7982972d

          SHA256

          d71c0aaec63294fb11af30ff408e94b5fff656149da01e3f7a97e3026580d5c2

          SHA512

          e2d08ae110f30257daa9341d1e3c91d6c50f6b32107d1e1ca0badcce872d09ac3d3a3998f26b1f93c3b1937317ce5ea240652d1b784c5a4d2e30273c19a9b6ad

        • C:\Users\Admin\AppData\Local\Temp\Ryfererfh.tmp

          Filesize

          817KB

          MD5

          0a6c58fc386c9a4d7d43b809447f3eac

          SHA1

          b07d0ae1180e21bf79b3b720d9e03e2b7982972d

          SHA256

          d71c0aaec63294fb11af30ff408e94b5fff656149da01e3f7a97e3026580d5c2

          SHA512

          e2d08ae110f30257daa9341d1e3c91d6c50f6b32107d1e1ca0badcce872d09ac3d3a3998f26b1f93c3b1937317ce5ea240652d1b784c5a4d2e30273c19a9b6ad

        • memory/644-162-0x000001F4F24B0000-0x000001F4F25F0000-memory.dmp

          Filesize

          1.2MB

        • memory/644-163-0x000001F4F24B0000-0x000001F4F25F0000-memory.dmp

          Filesize

          1.2MB

        • memory/644-164-0x0000000000760000-0x00000000009F9000-memory.dmp

          Filesize

          2.6MB

        • memory/644-165-0x000001F4F0A60000-0x000001F4F0D0A000-memory.dmp

          Filesize

          2.7MB

        • memory/1476-142-0x0000000004903000-0x00000000049EC000-memory.dmp

          Filesize

          932KB

        • memory/1476-143-0x00000000049F0000-0x0000000004B1C000-memory.dmp

          Filesize

          1.2MB

        • memory/1476-144-0x0000000000400000-0x0000000002C86000-memory.dmp

          Filesize

          40.5MB

        • memory/2092-156-0x0000000004680000-0x00000000047C0000-memory.dmp

          Filesize

          1.2MB

        • memory/2092-158-0x0000000004680000-0x00000000047C0000-memory.dmp

          Filesize

          1.2MB

        • memory/2092-166-0x0000000004CC0000-0x000000000581A000-memory.dmp

          Filesize

          11.4MB

        • memory/2092-151-0x0000000004CC0000-0x000000000581A000-memory.dmp

          Filesize

          11.4MB

        • memory/2092-152-0x0000000004CC0000-0x000000000581A000-memory.dmp

          Filesize

          11.4MB

        • memory/2092-153-0x0000000004680000-0x00000000047C0000-memory.dmp

          Filesize

          1.2MB

        • memory/2092-154-0x0000000004680000-0x00000000047C0000-memory.dmp

          Filesize

          1.2MB

        • memory/2092-159-0x0000000004680000-0x00000000047C0000-memory.dmp

          Filesize

          1.2MB

        • memory/2092-160-0x00000000046F9000-0x00000000046FB000-memory.dmp

          Filesize

          8KB

        • memory/2092-157-0x0000000004680000-0x00000000047C0000-memory.dmp

          Filesize

          1.2MB

        • memory/3420-148-0x0000000002EFD000-0x0000000002F17000-memory.dmp

          Filesize

          104KB

        • memory/3420-155-0x0000000000400000-0x0000000002BB6000-memory.dmp

          Filesize

          39.7MB

        • memory/3420-150-0x0000000000400000-0x0000000002BB6000-memory.dmp

          Filesize

          39.7MB

        • memory/3420-149-0x0000000002DF0000-0x0000000002E1A000-memory.dmp

          Filesize

          168KB

        • memory/4280-132-0x0000000002BDD000-0x0000000002BEE000-memory.dmp

          Filesize

          68KB

        • memory/4280-135-0x0000000000400000-0x0000000002BAD000-memory.dmp

          Filesize

          39.7MB

        • memory/4280-134-0x0000000000400000-0x0000000002BAD000-memory.dmp

          Filesize

          39.7MB

        • memory/4280-133-0x0000000002BB0000-0x0000000002BB9000-memory.dmp

          Filesize

          36KB