Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2023, 01:09
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
273KB
-
MD5
5d94d7efb94c90808f3d17e4665c7734
-
SHA1
b33c42a804ed9208ee457ea466119b8fa8b0e24d
-
SHA256
a1409f24e40fb5a5f190d68d237cfa5bb343e3796902dd09a5cce202a681f2c8
-
SHA512
c44cc01c9e9fb627e717075e852c41892ea8b248c729ee5d7fbdc9a5435d8999ef1b97f7c77ed5a421134328a7eeca7fc0e49b4aa2acdd0ab00acc5fa9d64c39
-
SSDEEP
3072:Cm8s08r4RtqubALv2po58+SMprhseGzPFQt8zd6U5OrpNCJQN0fm2Rh:SttqKe58+uxQyB6cOuTfz
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 1 IoCs
pid Process 3536 huuictt -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI huuictt Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI huuictt Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI huuictt -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4344 setup.exe 4344 setup.exe 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3112 Process not Found -
Suspicious behavior: MapViewOfSection 20 IoCs
pid Process 4344 setup.exe 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3536 huuictt 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3112 wrote to memory of 5060 3112 Process not Found 93 PID 3112 wrote to memory of 5060 3112 Process not Found 93 PID 3112 wrote to memory of 5060 3112 Process not Found 93 PID 3112 wrote to memory of 5060 3112 Process not Found 93 PID 3112 wrote to memory of 3844 3112 Process not Found 95 PID 3112 wrote to memory of 3844 3112 Process not Found 95 PID 3112 wrote to memory of 3844 3112 Process not Found 95 PID 3112 wrote to memory of 1520 3112 Process not Found 96 PID 3112 wrote to memory of 1520 3112 Process not Found 96 PID 3112 wrote to memory of 1520 3112 Process not Found 96 PID 3112 wrote to memory of 1520 3112 Process not Found 96 PID 3112 wrote to memory of 960 3112 Process not Found 97 PID 3112 wrote to memory of 960 3112 Process not Found 97 PID 3112 wrote to memory of 960 3112 Process not Found 97 PID 3112 wrote to memory of 4240 3112 Process not Found 98 PID 3112 wrote to memory of 4240 3112 Process not Found 98 PID 3112 wrote to memory of 4240 3112 Process not Found 98 PID 3112 wrote to memory of 4240 3112 Process not Found 98 PID 3112 wrote to memory of 4952 3112 Process not Found 99 PID 3112 wrote to memory of 4952 3112 Process not Found 99 PID 3112 wrote to memory of 4952 3112 Process not Found 99 PID 3112 wrote to memory of 4952 3112 Process not Found 99 PID 3112 wrote to memory of 776 3112 Process not Found 100 PID 3112 wrote to memory of 776 3112 Process not Found 100 PID 3112 wrote to memory of 776 3112 Process not Found 100 PID 3112 wrote to memory of 776 3112 Process not Found 100 PID 3112 wrote to memory of 1472 3112 Process not Found 101 PID 3112 wrote to memory of 1472 3112 Process not Found 101 PID 3112 wrote to memory of 1472 3112 Process not Found 101 PID 3112 wrote to memory of 1036 3112 Process not Found 102 PID 3112 wrote to memory of 1036 3112 Process not Found 102 PID 3112 wrote to memory of 1036 3112 Process not Found 102 PID 3112 wrote to memory of 1036 3112 Process not Found 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4344
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5060
-
C:\Users\Admin\AppData\Roaming\huuicttC:\Users\Admin\AppData\Roaming\huuictt1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3536
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3844
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1520
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:960
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4240
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4952
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:776
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1472
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1036
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
273KB
MD55d94d7efb94c90808f3d17e4665c7734
SHA1b33c42a804ed9208ee457ea466119b8fa8b0e24d
SHA256a1409f24e40fb5a5f190d68d237cfa5bb343e3796902dd09a5cce202a681f2c8
SHA512c44cc01c9e9fb627e717075e852c41892ea8b248c729ee5d7fbdc9a5435d8999ef1b97f7c77ed5a421134328a7eeca7fc0e49b4aa2acdd0ab00acc5fa9d64c39
-
Filesize
273KB
MD55d94d7efb94c90808f3d17e4665c7734
SHA1b33c42a804ed9208ee457ea466119b8fa8b0e24d
SHA256a1409f24e40fb5a5f190d68d237cfa5bb343e3796902dd09a5cce202a681f2c8
SHA512c44cc01c9e9fb627e717075e852c41892ea8b248c729ee5d7fbdc9a5435d8999ef1b97f7c77ed5a421134328a7eeca7fc0e49b4aa2acdd0ab00acc5fa9d64c39