Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2023, 12:10
Static task
static1
Behavioral task
behavioral1
Sample
6d1085ca99904e2f7d26eb2e2b040929c00d5a3d6e39437b53b6b7aaab8bd690.exe
Resource
win10v2004-20221111-en
General
-
Target
6d1085ca99904e2f7d26eb2e2b040929c00d5a3d6e39437b53b6b7aaab8bd690.exe
-
Size
327KB
-
MD5
517bbd12525eb7512758c6b2d8e989e6
-
SHA1
2be931f4dba7b0eb558ee4dc162a602ef4939212
-
SHA256
6d1085ca99904e2f7d26eb2e2b040929c00d5a3d6e39437b53b6b7aaab8bd690
-
SHA512
7d1495d38f51fe40582c932bec31b07583ed4f55ba96ef46476080ca002105d0476d7d6a3241a79d2f232d855bce20a2333631b0f6c9ac49009d45edecc0738e
-
SSDEEP
6144:C/d5XLV4HxrAxdSMW7G64yyNES5byDqCFNsY6:C/rV4HxOdxnyxOC4Y
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/4644-133-0x0000000000610000-0x0000000000619000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 3 IoCs
flow pid Process 36 944 rundll32.exe 38 944 rundll32.exe 64 944 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2524 F91A.exe 744 2C22.exe -
Loads dropped DLL 1 IoCs
pid Process 944 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 944 set thread context of 3456 944 rundll32.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1708 2524 WerFault.exe 88 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6d1085ca99904e2f7d26eb2e2b040929c00d5a3d6e39437b53b6b7aaab8bd690.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6d1085ca99904e2f7d26eb2e2b040929c00d5a3d6e39437b53b6b7aaab8bd690.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6d1085ca99904e2f7d26eb2e2b040929c00d5a3d6e39437b53b6b7aaab8bd690.exe -
Checks processor information in registry 2 TTPs 20 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Toolbar Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Process not Found -
Modifies registry class 30 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\WorkFolders Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 820074001c0043465346160031000000000000000000100041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f400009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004100700070004400610074006100000042000000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4e003100000000002b566869100054656d7000003a0009000400efbe6b557d6c2b5668692e00000000000000000000000000000000000000000000000000afed8700540065006d007000000014000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 50003100000000000000000010004c6f63616c003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c00000014000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Process not Found -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 388 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4644 6d1085ca99904e2f7d26eb2e2b040929c00d5a3d6e39437b53b6b7aaab8bd690.exe 4644 6d1085ca99904e2f7d26eb2e2b040929c00d5a3d6e39437b53b6b7aaab8bd690.exe 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found 388 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 388 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4644 6d1085ca99904e2f7d26eb2e2b040929c00d5a3d6e39437b53b6b7aaab8bd690.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found Token: SeShutdownPrivilege 388 Process not Found Token: SeCreatePagefilePrivilege 388 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3456 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 388 Process not Found 388 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 388 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 388 wrote to memory of 2524 388 Process not Found 88 PID 388 wrote to memory of 2524 388 Process not Found 88 PID 388 wrote to memory of 2524 388 Process not Found 88 PID 2524 wrote to memory of 944 2524 F91A.exe 89 PID 2524 wrote to memory of 944 2524 F91A.exe 89 PID 2524 wrote to memory of 944 2524 F91A.exe 89 PID 388 wrote to memory of 744 388 Process not Found 92 PID 388 wrote to memory of 744 388 Process not Found 92 PID 388 wrote to memory of 744 388 Process not Found 92 PID 944 wrote to memory of 3456 944 rundll32.exe 93 PID 944 wrote to memory of 3456 944 rundll32.exe 93 PID 944 wrote to memory of 3456 944 rundll32.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d1085ca99904e2f7d26eb2e2b040929c00d5a3d6e39437b53b6b7aaab8bd690.exe"C:\Users\Admin\AppData\Local\Temp\6d1085ca99904e2f7d26eb2e2b040929c00d5a3d6e39437b53b6b7aaab8bd690.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4644
-
C:\Users\Admin\AppData\Local\Temp\F91A.exeC:\Users\Admin\AppData\Local\Temp\F91A.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Qytyaworpiotpd.tmp",Edoqqdswdffqipe2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 237593⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:3456
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2524 -s 5282⤵
- Program crash
PID:1708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2524 -ip 25241⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\2C22.exeC:\Users\Admin\AppData\Local\Temp\2C22.exe1⤵
- Executes dropped EXE
PID:744
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4880
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
347KB
MD548f7c8c84eee4a6cd6f00666bacb5119
SHA1f4affe861ba52a3d1efcc3e4cd421ab79b0fb66d
SHA256727f18733aa96b80ed4a42b4543d746230f8d3a0ac13931f8ca1935d3cd1c96d
SHA512e0e17e915e12bce368dc123c5068c597424940fcf5c9c6c844afb810d4d002552cf9087b6f8509c7d0a907c150299c373c0251a34718c3066718ecafb336cc32
-
Filesize
347KB
MD548f7c8c84eee4a6cd6f00666bacb5119
SHA1f4affe861ba52a3d1efcc3e4cd421ab79b0fb66d
SHA256727f18733aa96b80ed4a42b4543d746230f8d3a0ac13931f8ca1935d3cd1c96d
SHA512e0e17e915e12bce368dc123c5068c597424940fcf5c9c6c844afb810d4d002552cf9087b6f8509c7d0a907c150299c373c0251a34718c3066718ecafb336cc32
-
Filesize
1.1MB
MD5c52b5a08f94b85f9c6cd41f67e6efe96
SHA1979a16f04b050882755eac98f52cf934a529f26a
SHA25633ce3667901ba42f04678e49b2153420e0b85094d8c3640077cabc751f348f55
SHA512541baa8922f43d2e625f0d1b9005ee72f56f1a263833bdfe6d5e978d839613fe27f25758e5b801e878d276963b4aeb856e18275dae61b63b68a00aaec7858eba
-
Filesize
1.1MB
MD5c52b5a08f94b85f9c6cd41f67e6efe96
SHA1979a16f04b050882755eac98f52cf934a529f26a
SHA25633ce3667901ba42f04678e49b2153420e0b85094d8c3640077cabc751f348f55
SHA512541baa8922f43d2e625f0d1b9005ee72f56f1a263833bdfe6d5e978d839613fe27f25758e5b801e878d276963b4aeb856e18275dae61b63b68a00aaec7858eba
-
Filesize
752KB
MD5710af73b2d7e92d33fac751318c08101
SHA12208c96a528b1d96e18ae47ab274f303e4099fff
SHA25672021339c18f79141f9867c30616cbbdc517471e44d16bfe81063e5c7dba56c3
SHA5121f19138b8412b871ccf33ec351d28157b6571bc02cb1d338fc4c06bd77e9518bbdb3392d63b9bcdde2bd94746c232f90b4796363f83cecfd49e0470b6495ac1a
-
Filesize
752KB
MD5710af73b2d7e92d33fac751318c08101
SHA12208c96a528b1d96e18ae47ab274f303e4099fff
SHA25672021339c18f79141f9867c30616cbbdc517471e44d16bfe81063e5c7dba56c3
SHA5121f19138b8412b871ccf33ec351d28157b6571bc02cb1d338fc4c06bd77e9518bbdb3392d63b9bcdde2bd94746c232f90b4796363f83cecfd49e0470b6495ac1a