Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
26/03/2023, 01:41
Static task
static1
Behavioral task
behavioral1
Sample
d1727fd2dcec34bff84d6c3e2c40faaae48778c63e667d1bc4ba3f5e9551dbfd.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d1727fd2dcec34bff84d6c3e2c40faaae48778c63e667d1bc4ba3f5e9551dbfd.exe
Resource
win10v2004-20230220-en
General
-
Target
d1727fd2dcec34bff84d6c3e2c40faaae48778c63e667d1bc4ba3f5e9551dbfd.exe
-
Size
249KB
-
MD5
966165e4becd35b65cd6b4c79816241d
-
SHA1
66d5cbcde976c5ca6f7c02fbefca031d267cd752
-
SHA256
d1727fd2dcec34bff84d6c3e2c40faaae48778c63e667d1bc4ba3f5e9551dbfd
-
SHA512
e6dbe91c578b8e4b9963198fb60a5a297b79ec77de79a992a0e836564fa9bd74e02ae1bc8ae051a3585dcb7e8d5ad9f6dd46a9126489bc1ae481ed43efa3c52c
-
SSDEEP
3072:/ny6OeRqqd7TDKc8+J5Iq/3/Xwzm7OfEJN3IQSP+mIytUOAzkrWN8aeDr:/LO5i61ma1iOxV4yO1yva
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d1727fd2dcec34bff84d6c3e2c40faaae48778c63e667d1bc4ba3f5e9551dbfd.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d1727fd2dcec34bff84d6c3e2c40faaae48778c63e667d1bc4ba3f5e9551dbfd.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d1727fd2dcec34bff84d6c3e2c40faaae48778c63e667d1bc4ba3f5e9551dbfd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1256 d1727fd2dcec34bff84d6c3e2c40faaae48778c63e667d1bc4ba3f5e9551dbfd.exe 1256 d1727fd2dcec34bff84d6c3e2c40faaae48778c63e667d1bc4ba3f5e9551dbfd.exe 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found 1212 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1212 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1256 d1727fd2dcec34bff84d6c3e2c40faaae48778c63e667d1bc4ba3f5e9551dbfd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1727fd2dcec34bff84d6c3e2c40faaae48778c63e667d1bc4ba3f5e9551dbfd.exe"C:\Users\Admin\AppData\Local\Temp\d1727fd2dcec34bff84d6c3e2c40faaae48778c63e667d1bc4ba3f5e9551dbfd.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1256