Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19/04/2023, 16:05
Static task
static1
Behavioral task
behavioral1
Sample
c7e25075b3d4200b1c9ef102c4c32eb2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c7e25075b3d4200b1c9ef102c4c32eb2.exe
Resource
win10v2004-20230220-en
General
-
Target
c7e25075b3d4200b1c9ef102c4c32eb2.exe
-
Size
236KB
-
MD5
c7e25075b3d4200b1c9ef102c4c32eb2
-
SHA1
e0ac9316bfd05f46ad7da13526ec2d5b03202046
-
SHA256
683f0358815c8f598b1fe8b537e072a515115da4d2e63fcc6e9ffbf61870d3c0
-
SHA512
8c32854ee4aa14ef5ceb249fe37e13d142c3cc0eb0f23dc10a0b95f6598e87eb5fdf97b5d1d101caf0472e0b3899cf0adf4c56bd96048fe3987f8adb6c22a476
-
SSDEEP
3072:1Xble7H5QnsEQP6MzIM28KFy9XwHUHgG/Nf5/FEWwYPDpJKJRfeI:NleVXEQiMMM28KA9XLgMNhFaYPDWJ
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c7e25075b3d4200b1c9ef102c4c32eb2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c7e25075b3d4200b1c9ef102c4c32eb2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c7e25075b3d4200b1c9ef102c4c32eb2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1696 c7e25075b3d4200b1c9ef102c4c32eb2.exe 1696 c7e25075b3d4200b1c9ef102c4c32eb2.exe 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found 1228 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1228 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1696 c7e25075b3d4200b1c9ef102c4c32eb2.exe