Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2023, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
293KB
-
MD5
c06f9aad75142dbab17566983724fa53
-
SHA1
d7d4bf3cb86fa67deffc916793bc70ea314a6f8f
-
SHA256
87c1317444d15330dc15efe48648658aeebd80a477f763f535695815a7848713
-
SHA512
976b59275e68cfec31c2a7975d8ca656f66096b02d2a10c42d03bc353b72d0fa9794c36db18cea8ccdf9b7c26dd599c1a548c67bd4217f12e26e5c4d823a18af
-
SSDEEP
3072:uUJ/+k9A2BOlMG9qx494GSsZ2k3s3EqV8x+rH2Cf+8QPMsN6qTWWvQfo:vXtBuV9qSfsERxSWCG8g8
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3856 setup.exe 3856 setup.exe 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3156 Process not Found -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 3856 setup.exe 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3156 wrote to memory of 3448 3156 Process not Found 88 PID 3156 wrote to memory of 3448 3156 Process not Found 88 PID 3156 wrote to memory of 3448 3156 Process not Found 88 PID 3156 wrote to memory of 3448 3156 Process not Found 88 PID 3156 wrote to memory of 436 3156 Process not Found 89 PID 3156 wrote to memory of 436 3156 Process not Found 89 PID 3156 wrote to memory of 436 3156 Process not Found 89 PID 3156 wrote to memory of 2156 3156 Process not Found 90 PID 3156 wrote to memory of 2156 3156 Process not Found 90 PID 3156 wrote to memory of 2156 3156 Process not Found 90 PID 3156 wrote to memory of 2156 3156 Process not Found 90 PID 3156 wrote to memory of 1492 3156 Process not Found 91 PID 3156 wrote to memory of 1492 3156 Process not Found 91 PID 3156 wrote to memory of 1492 3156 Process not Found 91 PID 3156 wrote to memory of 1752 3156 Process not Found 92 PID 3156 wrote to memory of 1752 3156 Process not Found 92 PID 3156 wrote to memory of 1752 3156 Process not Found 92 PID 3156 wrote to memory of 1752 3156 Process not Found 92 PID 3156 wrote to memory of 1344 3156 Process not Found 93 PID 3156 wrote to memory of 1344 3156 Process not Found 93 PID 3156 wrote to memory of 1344 3156 Process not Found 93 PID 3156 wrote to memory of 1344 3156 Process not Found 93 PID 3156 wrote to memory of 5096 3156 Process not Found 94 PID 3156 wrote to memory of 5096 3156 Process not Found 94 PID 3156 wrote to memory of 5096 3156 Process not Found 94 PID 3156 wrote to memory of 5096 3156 Process not Found 94 PID 3156 wrote to memory of 1292 3156 Process not Found 95 PID 3156 wrote to memory of 1292 3156 Process not Found 95 PID 3156 wrote to memory of 1292 3156 Process not Found 95 PID 3156 wrote to memory of 2132 3156 Process not Found 96 PID 3156 wrote to memory of 2132 3156 Process not Found 96 PID 3156 wrote to memory of 2132 3156 Process not Found 96 PID 3156 wrote to memory of 2132 3156 Process not Found 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3856
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3448
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:436
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2156
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1492
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1752
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1344
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5096
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1292
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2132