Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2023, 03:19
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
260KB
-
MD5
8dd7b8847ca62948271c0ca8337e0ea8
-
SHA1
d57305487a10efbe9ceb289aa3cfd321bb441e37
-
SHA256
cdd4ad75553bf6d0221d92109a38a6d30df3bcb2b09b6f0ac43d380e66621954
-
SHA512
94857a53c5e3e5445e8bf13b66ddc6d0b9f5d918e47a77c1d4a60c4709480296aab20aa3c695a2c650e92c973d91074050ed5be3decfdf9fd7451f567e7dd9f9
-
SSDEEP
3072:KXmxUC4d5Vokvx4Y2Xg6biUbxhxIEl8apb8pBI8jwWRjoV:qBBx4JFppgpRjFE
Malware Config
Signatures
-
Detects Smokeloader packer 6 IoCs
resource yara_rule behavioral2/memory/1976-133-0x00000000048E0000-0x00000000048E9000-memory.dmp family_smokeloader behavioral2/memory/3916-135-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/3916-137-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/3916-138-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/316-145-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/316-146-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 3892 veseebu 316 veseebu -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1976 set thread context of 3916 1976 file.exe 80 PID 3892 set thread context of 316 3892 veseebu 89 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI veseebu Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI veseebu Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI veseebu -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3916 file.exe 3916 file.exe 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2724 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3916 file.exe 316 veseebu -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1976 wrote to memory of 3916 1976 file.exe 80 PID 1976 wrote to memory of 3916 1976 file.exe 80 PID 1976 wrote to memory of 3916 1976 file.exe 80 PID 1976 wrote to memory of 3916 1976 file.exe 80 PID 1976 wrote to memory of 3916 1976 file.exe 80 PID 1976 wrote to memory of 3916 1976 file.exe 80 PID 3892 wrote to memory of 316 3892 veseebu 89 PID 3892 wrote to memory of 316 3892 veseebu 89 PID 3892 wrote to memory of 316 3892 veseebu 89 PID 3892 wrote to memory of 316 3892 veseebu 89 PID 3892 wrote to memory of 316 3892 veseebu 89 PID 3892 wrote to memory of 316 3892 veseebu 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3916
-
-
C:\Users\Admin\AppData\Roaming\veseebuC:\Users\Admin\AppData\Roaming\veseebu1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Roaming\veseebuC:\Users\Admin\AppData\Roaming\veseebu2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:316
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD58dd7b8847ca62948271c0ca8337e0ea8
SHA1d57305487a10efbe9ceb289aa3cfd321bb441e37
SHA256cdd4ad75553bf6d0221d92109a38a6d30df3bcb2b09b6f0ac43d380e66621954
SHA51294857a53c5e3e5445e8bf13b66ddc6d0b9f5d918e47a77c1d4a60c4709480296aab20aa3c695a2c650e92c973d91074050ed5be3decfdf9fd7451f567e7dd9f9
-
Filesize
260KB
MD58dd7b8847ca62948271c0ca8337e0ea8
SHA1d57305487a10efbe9ceb289aa3cfd321bb441e37
SHA256cdd4ad75553bf6d0221d92109a38a6d30df3bcb2b09b6f0ac43d380e66621954
SHA51294857a53c5e3e5445e8bf13b66ddc6d0b9f5d918e47a77c1d4a60c4709480296aab20aa3c695a2c650e92c973d91074050ed5be3decfdf9fd7451f567e7dd9f9
-
Filesize
260KB
MD58dd7b8847ca62948271c0ca8337e0ea8
SHA1d57305487a10efbe9ceb289aa3cfd321bb441e37
SHA256cdd4ad75553bf6d0221d92109a38a6d30df3bcb2b09b6f0ac43d380e66621954
SHA51294857a53c5e3e5445e8bf13b66ddc6d0b9f5d918e47a77c1d4a60c4709480296aab20aa3c695a2c650e92c973d91074050ed5be3decfdf9fd7451f567e7dd9f9