Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2023, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
276KB
-
MD5
c579c917e1193bb0d9caeb9a25a0346a
-
SHA1
3a9f68a29953b0efee797553a8cd89302c0247a4
-
SHA256
079b674d7463e18b51a879894fb56754ba0b425c9b2d7bb9265a37a3b59230eb
-
SHA512
62bd88470d44eef8c427b1988f5cc41641fb2c171a2e88feaf35bdbbf183aa99ca979f726cf6243e6ab5a57d948339f96f26ac636bf137e3c5b874d0006674b3
-
SSDEEP
3072:zxkf182x6t4Ci95kwUlfCjmg4dZKtl3iz4Zl4tlmo9ZSSH3T20qWN8aeeL:Fw+HkYfCjHsz4H01T20qva
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 1 IoCs
pid Process 3176 jsbwbfh -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jsbwbfh Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jsbwbfh Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jsbwbfh Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1392 setup.exe 1392 setup.exe 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3120 Process not Found -
Suspicious behavior: MapViewOfSection 20 IoCs
pid Process 1392 setup.exe 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3120 Process not Found 3176 jsbwbfh -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3120 wrote to memory of 792 3120 Process not Found 98 PID 3120 wrote to memory of 792 3120 Process not Found 98 PID 3120 wrote to memory of 792 3120 Process not Found 98 PID 3120 wrote to memory of 792 3120 Process not Found 98 PID 3120 wrote to memory of 4460 3120 Process not Found 100 PID 3120 wrote to memory of 4460 3120 Process not Found 100 PID 3120 wrote to memory of 4460 3120 Process not Found 100 PID 3120 wrote to memory of 4384 3120 Process not Found 101 PID 3120 wrote to memory of 4384 3120 Process not Found 101 PID 3120 wrote to memory of 4384 3120 Process not Found 101 PID 3120 wrote to memory of 4384 3120 Process not Found 101 PID 3120 wrote to memory of 4216 3120 Process not Found 102 PID 3120 wrote to memory of 4216 3120 Process not Found 102 PID 3120 wrote to memory of 4216 3120 Process not Found 102 PID 3120 wrote to memory of 4680 3120 Process not Found 103 PID 3120 wrote to memory of 4680 3120 Process not Found 103 PID 3120 wrote to memory of 4680 3120 Process not Found 103 PID 3120 wrote to memory of 4680 3120 Process not Found 103 PID 3120 wrote to memory of 2420 3120 Process not Found 104 PID 3120 wrote to memory of 2420 3120 Process not Found 104 PID 3120 wrote to memory of 2420 3120 Process not Found 104 PID 3120 wrote to memory of 2420 3120 Process not Found 104 PID 3120 wrote to memory of 2380 3120 Process not Found 106 PID 3120 wrote to memory of 2380 3120 Process not Found 106 PID 3120 wrote to memory of 2380 3120 Process not Found 106 PID 3120 wrote to memory of 2380 3120 Process not Found 106 PID 3120 wrote to memory of 4860 3120 Process not Found 107 PID 3120 wrote to memory of 4860 3120 Process not Found 107 PID 3120 wrote to memory of 4860 3120 Process not Found 107 PID 3120 wrote to memory of 4168 3120 Process not Found 110 PID 3120 wrote to memory of 4168 3120 Process not Found 110 PID 3120 wrote to memory of 4168 3120 Process not Found 110 PID 3120 wrote to memory of 4168 3120 Process not Found 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1392
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:792
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4460
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4384
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4216
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4680
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2420
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2380
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4860
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4168
-
C:\Users\Admin\AppData\Roaming\jsbwbfhC:\Users\Admin\AppData\Roaming\jsbwbfh1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3176
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276KB
MD5c579c917e1193bb0d9caeb9a25a0346a
SHA13a9f68a29953b0efee797553a8cd89302c0247a4
SHA256079b674d7463e18b51a879894fb56754ba0b425c9b2d7bb9265a37a3b59230eb
SHA51262bd88470d44eef8c427b1988f5cc41641fb2c171a2e88feaf35bdbbf183aa99ca979f726cf6243e6ab5a57d948339f96f26ac636bf137e3c5b874d0006674b3
-
Filesize
276KB
MD5c579c917e1193bb0d9caeb9a25a0346a
SHA13a9f68a29953b0efee797553a8cd89302c0247a4
SHA256079b674d7463e18b51a879894fb56754ba0b425c9b2d7bb9265a37a3b59230eb
SHA51262bd88470d44eef8c427b1988f5cc41641fb2c171a2e88feaf35bdbbf183aa99ca979f726cf6243e6ab5a57d948339f96f26ac636bf137e3c5b874d0006674b3