Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
15/01/2023, 17:15
Static task
static1
General
-
Target
94df69dfe27e1b3da2ecee9169c4e075c213d1e94cebb534ac65ea5093e3d513.exe
-
Size
210KB
-
MD5
e4579885cf59fe9bc9a42f26a54b6e83
-
SHA1
f4365fae65d6c29079eae9cc03e1a3f5b4559fba
-
SHA256
94df69dfe27e1b3da2ecee9169c4e075c213d1e94cebb534ac65ea5093e3d513
-
SHA512
b85c099e04d5fe018d0e9c8623994a8929cca61ce1aca412f09f1dc4faf24d54d3db5b9bf3404721fbdab7ba2b3cefaeb3fb388a9623fce7655192cd89e43e71
-
SSDEEP
3072:TXWhFVbRR3ns515T9Z08rSZ8WtYtS5i2gyGaDH9Zk/0DTEi:L+Ea8m+WWtAiMJDH3
Malware Config
Extracted
lumma
77.73.134.68
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/2608-133-0x0000000002D20000-0x0000000002D29000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 3716 13D1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 1 IoCs
pid pid_target Process procid_target 4576 3716 WerFault.exe 86 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 94df69dfe27e1b3da2ecee9169c4e075c213d1e94cebb534ac65ea5093e3d513.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 94df69dfe27e1b3da2ecee9169c4e075c213d1e94cebb534ac65ea5093e3d513.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 94df69dfe27e1b3da2ecee9169c4e075c213d1e94cebb534ac65ea5093e3d513.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2608 94df69dfe27e1b3da2ecee9169c4e075c213d1e94cebb534ac65ea5093e3d513.exe 2608 94df69dfe27e1b3da2ecee9169c4e075c213d1e94cebb534ac65ea5093e3d513.exe 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2724 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2608 94df69dfe27e1b3da2ecee9169c4e075c213d1e94cebb534ac65ea5093e3d513.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2724 wrote to memory of 3716 2724 Process not Found 86 PID 2724 wrote to memory of 3716 2724 Process not Found 86 PID 2724 wrote to memory of 3716 2724 Process not Found 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\94df69dfe27e1b3da2ecee9169c4e075c213d1e94cebb534ac65ea5093e3d513.exe"C:\Users\Admin\AppData\Local\Temp\94df69dfe27e1b3da2ecee9169c4e075c213d1e94cebb534ac65ea5093e3d513.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2608
-
C:\Users\Admin\AppData\Local\Temp\13D1.exeC:\Users\Admin\AppData\Local\Temp\13D1.exe1⤵
- Executes dropped EXE
PID:3716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 13762⤵
- Program crash
PID:4576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3716 -ip 37161⤵PID:4704
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD5b7a88887e20e7658af423615d1399590
SHA1c88ed903fb0cddcf2eba4f0437c476ab34fadf59
SHA2566ebac5146cf168228e348df9f3f1006dc0f9ee26021ac18c8a6b572da174b182
SHA5121f96bb4a1739e921a75a7573d5649e5981ffd4ad51eb3712fa88fa8418109d3a69a3937135d00179790db0165a88f408c7fa2671c394da499c75e1b781b1b1c7
-
Filesize
248KB
MD5b7a88887e20e7658af423615d1399590
SHA1c88ed903fb0cddcf2eba4f0437c476ab34fadf59
SHA2566ebac5146cf168228e348df9f3f1006dc0f9ee26021ac18c8a6b572da174b182
SHA5121f96bb4a1739e921a75a7573d5649e5981ffd4ad51eb3712fa88fa8418109d3a69a3937135d00179790db0165a88f408c7fa2671c394da499c75e1b781b1b1c7