Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19/03/2023, 18:41
Static task
static1
Behavioral task
behavioral1
Sample
e2d2f8d3ce4b85cfa4fe4ed1558210ea.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e2d2f8d3ce4b85cfa4fe4ed1558210ea.exe
Resource
win10v2004-20230220-en
General
-
Target
e2d2f8d3ce4b85cfa4fe4ed1558210ea.exe
-
Size
293KB
-
MD5
e2d2f8d3ce4b85cfa4fe4ed1558210ea
-
SHA1
38ce578e3f7bf9e44cd1d39f0428bfb0661c6516
-
SHA256
beb4dbad0971b8d0d54abac0bd599b882710b7abb058870ca36363b976328245
-
SHA512
d09411a9e1b0a6663df0e2bd9136ca35533a3c2e7ddfe26640d45b3cb5b7bcb418159a49ae981a4f2d2ebbcb3755d527f21b36a0533bab47ec3819d48c43294f
-
SSDEEP
3072:sDPH8XhL1vjbtf78UOIextiRNx3wgrpM3eLLRd5nbrQJhXx7:NXhL1vZwmYiNx3pMOvChX5
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e2d2f8d3ce4b85cfa4fe4ed1558210ea.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e2d2f8d3ce4b85cfa4fe4ed1558210ea.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e2d2f8d3ce4b85cfa4fe4ed1558210ea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1704 e2d2f8d3ce4b85cfa4fe4ed1558210ea.exe 1704 e2d2f8d3ce4b85cfa4fe4ed1558210ea.exe 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found 1344 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1344 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1704 e2d2f8d3ce4b85cfa4fe4ed1558210ea.exe