Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2023, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
735ea8b6be688b5bef23df1ba51cd6f7165dcc4af65e50541880051833adf38c.exe
Resource
win10v2004-20230221-en
General
-
Target
735ea8b6be688b5bef23df1ba51cd6f7165dcc4af65e50541880051833adf38c.exe
-
Size
330KB
-
MD5
0542ea217343e65ec0feb2a844b6014e
-
SHA1
67847d5094aa921f95d20b93d0dff892196828f2
-
SHA256
735ea8b6be688b5bef23df1ba51cd6f7165dcc4af65e50541880051833adf38c
-
SHA512
626edfb0a6cc4b1abe0ae6bd56c00edb9ca7f7dd95e93f4cc5a11a149d81b0178d91fab890b8d301da5d3424a804533576ca40a18a7d212453316df9bcbe5a90
-
SSDEEP
6144:zyOt1vL4Yzy0Zt900maZXbV6sFDIHKxhPH:31vsYzy0Zv0aXduqPH
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 735ea8b6be688b5bef23df1ba51cd6f7165dcc4af65e50541880051833adf38c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 735ea8b6be688b5bef23df1ba51cd6f7165dcc4af65e50541880051833adf38c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 735ea8b6be688b5bef23df1ba51cd6f7165dcc4af65e50541880051833adf38c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 540 735ea8b6be688b5bef23df1ba51cd6f7165dcc4af65e50541880051833adf38c.exe 540 735ea8b6be688b5bef23df1ba51cd6f7165dcc4af65e50541880051833adf38c.exe 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3164 Process not Found -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 540 735ea8b6be688b5bef23df1ba51cd6f7165dcc4af65e50541880051833adf38c.exe 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3164 wrote to memory of 4148 3164 Process not Found 90 PID 3164 wrote to memory of 4148 3164 Process not Found 90 PID 3164 wrote to memory of 4148 3164 Process not Found 90 PID 3164 wrote to memory of 4148 3164 Process not Found 90 PID 3164 wrote to memory of 1040 3164 Process not Found 91 PID 3164 wrote to memory of 1040 3164 Process not Found 91 PID 3164 wrote to memory of 1040 3164 Process not Found 91 PID 3164 wrote to memory of 3784 3164 Process not Found 92 PID 3164 wrote to memory of 3784 3164 Process not Found 92 PID 3164 wrote to memory of 3784 3164 Process not Found 92 PID 3164 wrote to memory of 3784 3164 Process not Found 92 PID 3164 wrote to memory of 4156 3164 Process not Found 93 PID 3164 wrote to memory of 4156 3164 Process not Found 93 PID 3164 wrote to memory of 4156 3164 Process not Found 93 PID 3164 wrote to memory of 4584 3164 Process not Found 94 PID 3164 wrote to memory of 4584 3164 Process not Found 94 PID 3164 wrote to memory of 4584 3164 Process not Found 94 PID 3164 wrote to memory of 4584 3164 Process not Found 94 PID 3164 wrote to memory of 2656 3164 Process not Found 95 PID 3164 wrote to memory of 2656 3164 Process not Found 95 PID 3164 wrote to memory of 2656 3164 Process not Found 95 PID 3164 wrote to memory of 2656 3164 Process not Found 95 PID 3164 wrote to memory of 3484 3164 Process not Found 97 PID 3164 wrote to memory of 3484 3164 Process not Found 97 PID 3164 wrote to memory of 3484 3164 Process not Found 97 PID 3164 wrote to memory of 3484 3164 Process not Found 97 PID 3164 wrote to memory of 5020 3164 Process not Found 98 PID 3164 wrote to memory of 5020 3164 Process not Found 98 PID 3164 wrote to memory of 5020 3164 Process not Found 98 PID 3164 wrote to memory of 464 3164 Process not Found 99 PID 3164 wrote to memory of 464 3164 Process not Found 99 PID 3164 wrote to memory of 464 3164 Process not Found 99 PID 3164 wrote to memory of 464 3164 Process not Found 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\735ea8b6be688b5bef23df1ba51cd6f7165dcc4af65e50541880051833adf38c.exe"C:\Users\Admin\AppData\Local\Temp\735ea8b6be688b5bef23df1ba51cd6f7165dcc4af65e50541880051833adf38c.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:540
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4148
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1040
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3784
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4156
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4584
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2656
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3484
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:5020
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:464