Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2023, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
1d7437d860a392e93ea83ebe6b11a9a127d95c70699c576900a828ab869676be.exe
Resource
win10v2004-20230220-en
General
-
Target
1d7437d860a392e93ea83ebe6b11a9a127d95c70699c576900a828ab869676be.exe
-
Size
179KB
-
MD5
8e34b1f2f8dde77647df4a288d2d0892
-
SHA1
3a999eee6560c3e734b6e15b955830b3a3d1ed39
-
SHA256
1d7437d860a392e93ea83ebe6b11a9a127d95c70699c576900a828ab869676be
-
SHA512
b960d0b497d8942b1ed7c52709b5fd1b173875a4ffc375399c8c01e3d0180e766a5f276980560ac340d89b03e4547880401cba4271fbb7ea01aaa0bdbeb2e099
-
SSDEEP
3072:oF8J9qXc9beLdp2CE1XbqZt7LdeibCTK94phdwnRztlXB9R:f4XMbeLlEhbELLb264phdwnR5lX
Malware Config
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
Detects Smokeloader packer 6 IoCs
resource yara_rule behavioral1/memory/3992-134-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3980-135-0x0000000000630000-0x0000000000639000-memory.dmp family_smokeloader behavioral1/memory/3992-136-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3992-138-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2540-206-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2540-213-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 400 gtrvvhr 2540 gtrvvhr -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3980 set thread context of 3992 3980 1d7437d860a392e93ea83ebe6b11a9a127d95c70699c576900a828ab869676be.exe 86 PID 400 set thread context of 2540 400 gtrvvhr 103 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1d7437d860a392e93ea83ebe6b11a9a127d95c70699c576900a828ab869676be.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1d7437d860a392e93ea83ebe6b11a9a127d95c70699c576900a828ab869676be.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1d7437d860a392e93ea83ebe6b11a9a127d95c70699c576900a828ab869676be.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gtrvvhr Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gtrvvhr Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gtrvvhr -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3992 1d7437d860a392e93ea83ebe6b11a9a127d95c70699c576900a828ab869676be.exe 3992 1d7437d860a392e93ea83ebe6b11a9a127d95c70699c576900a828ab869676be.exe 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3136 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3992 1d7437d860a392e93ea83ebe6b11a9a127d95c70699c576900a828ab869676be.exe 2540 gtrvvhr -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3136 Process not Found 3136 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3980 wrote to memory of 3992 3980 1d7437d860a392e93ea83ebe6b11a9a127d95c70699c576900a828ab869676be.exe 86 PID 3980 wrote to memory of 3992 3980 1d7437d860a392e93ea83ebe6b11a9a127d95c70699c576900a828ab869676be.exe 86 PID 3980 wrote to memory of 3992 3980 1d7437d860a392e93ea83ebe6b11a9a127d95c70699c576900a828ab869676be.exe 86 PID 3980 wrote to memory of 3992 3980 1d7437d860a392e93ea83ebe6b11a9a127d95c70699c576900a828ab869676be.exe 86 PID 3980 wrote to memory of 3992 3980 1d7437d860a392e93ea83ebe6b11a9a127d95c70699c576900a828ab869676be.exe 86 PID 3980 wrote to memory of 3992 3980 1d7437d860a392e93ea83ebe6b11a9a127d95c70699c576900a828ab869676be.exe 86 PID 400 wrote to memory of 2540 400 gtrvvhr 103 PID 400 wrote to memory of 2540 400 gtrvvhr 103 PID 400 wrote to memory of 2540 400 gtrvvhr 103 PID 400 wrote to memory of 2540 400 gtrvvhr 103 PID 400 wrote to memory of 2540 400 gtrvvhr 103 PID 400 wrote to memory of 2540 400 gtrvvhr 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d7437d860a392e93ea83ebe6b11a9a127d95c70699c576900a828ab869676be.exe"C:\Users\Admin\AppData\Local\Temp\1d7437d860a392e93ea83ebe6b11a9a127d95c70699c576900a828ab869676be.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\1d7437d860a392e93ea83ebe6b11a9a127d95c70699c576900a828ab869676be.exe"C:\Users\Admin\AppData\Local\Temp\1d7437d860a392e93ea83ebe6b11a9a127d95c70699c576900a828ab869676be.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3992
-
-
C:\Users\Admin\AppData\Roaming\gtrvvhrC:\Users\Admin\AppData\Roaming\gtrvvhr1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Roaming\gtrvvhrC:\Users\Admin\AppData\Roaming\gtrvvhr2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2540
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179KB
MD58e34b1f2f8dde77647df4a288d2d0892
SHA13a999eee6560c3e734b6e15b955830b3a3d1ed39
SHA2561d7437d860a392e93ea83ebe6b11a9a127d95c70699c576900a828ab869676be
SHA512b960d0b497d8942b1ed7c52709b5fd1b173875a4ffc375399c8c01e3d0180e766a5f276980560ac340d89b03e4547880401cba4271fbb7ea01aaa0bdbeb2e099
-
Filesize
179KB
MD58e34b1f2f8dde77647df4a288d2d0892
SHA13a999eee6560c3e734b6e15b955830b3a3d1ed39
SHA2561d7437d860a392e93ea83ebe6b11a9a127d95c70699c576900a828ab869676be
SHA512b960d0b497d8942b1ed7c52709b5fd1b173875a4ffc375399c8c01e3d0180e766a5f276980560ac340d89b03e4547880401cba4271fbb7ea01aaa0bdbeb2e099
-
Filesize
179KB
MD58e34b1f2f8dde77647df4a288d2d0892
SHA13a999eee6560c3e734b6e15b955830b3a3d1ed39
SHA2561d7437d860a392e93ea83ebe6b11a9a127d95c70699c576900a828ab869676be
SHA512b960d0b497d8942b1ed7c52709b5fd1b173875a4ffc375399c8c01e3d0180e766a5f276980560ac340d89b03e4547880401cba4271fbb7ea01aaa0bdbeb2e099