Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 12:49
Static task
static1
Behavioral task
behavioral1
Sample
0e2695c0e13c0c42a1e2b414631e8f120e00348aaa3b4e2b7655861d4e38e8d0.exe
Resource
win10v2004-20230220-en
General
-
Target
0e2695c0e13c0c42a1e2b414631e8f120e00348aaa3b4e2b7655861d4e38e8d0.exe
-
Size
264KB
-
MD5
a5aba859972d7f7555fa35b640fdbdbf
-
SHA1
a240cc388b0d2f41eb8b9f4d9c84debc508a21ac
-
SHA256
0e2695c0e13c0c42a1e2b414631e8f120e00348aaa3b4e2b7655861d4e38e8d0
-
SHA512
4938cd383f1e8a5ea4e00c5a58a6b46686fc60d8969205a49eb74a24e26a3b9e1aece6d077608ad9f580a8bb234accd65f94c6b179235d19734d9b7db7456d52
-
SSDEEP
6144:u4c98HS5DPiej+CleAuRaLtn0v2lFKNol:zceHSBPXNuRal0v2WNC
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0e2695c0e13c0c42a1e2b414631e8f120e00348aaa3b4e2b7655861d4e38e8d0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0e2695c0e13c0c42a1e2b414631e8f120e00348aaa3b4e2b7655861d4e38e8d0.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0e2695c0e13c0c42a1e2b414631e8f120e00348aaa3b4e2b7655861d4e38e8d0.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2100 0e2695c0e13c0c42a1e2b414631e8f120e00348aaa3b4e2b7655861d4e38e8d0.exe 2100 0e2695c0e13c0c42a1e2b414631e8f120e00348aaa3b4e2b7655861d4e38e8d0.exe 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3144 Process not Found -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 2100 0e2695c0e13c0c42a1e2b414631e8f120e00348aaa3b4e2b7655861d4e38e8d0.exe 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3144 wrote to memory of 4176 3144 Process not Found 91 PID 3144 wrote to memory of 4176 3144 Process not Found 91 PID 3144 wrote to memory of 4176 3144 Process not Found 91 PID 3144 wrote to memory of 4176 3144 Process not Found 91 PID 3144 wrote to memory of 4512 3144 Process not Found 92 PID 3144 wrote to memory of 4512 3144 Process not Found 92 PID 3144 wrote to memory of 4512 3144 Process not Found 92 PID 3144 wrote to memory of 460 3144 Process not Found 94 PID 3144 wrote to memory of 460 3144 Process not Found 94 PID 3144 wrote to memory of 460 3144 Process not Found 94 PID 3144 wrote to memory of 460 3144 Process not Found 94 PID 3144 wrote to memory of 3188 3144 Process not Found 95 PID 3144 wrote to memory of 3188 3144 Process not Found 95 PID 3144 wrote to memory of 3188 3144 Process not Found 95 PID 3144 wrote to memory of 800 3144 Process not Found 96 PID 3144 wrote to memory of 800 3144 Process not Found 96 PID 3144 wrote to memory of 800 3144 Process not Found 96 PID 3144 wrote to memory of 800 3144 Process not Found 96 PID 3144 wrote to memory of 1968 3144 Process not Found 97 PID 3144 wrote to memory of 1968 3144 Process not Found 97 PID 3144 wrote to memory of 1968 3144 Process not Found 97 PID 3144 wrote to memory of 1968 3144 Process not Found 97 PID 3144 wrote to memory of 1384 3144 Process not Found 98 PID 3144 wrote to memory of 1384 3144 Process not Found 98 PID 3144 wrote to memory of 1384 3144 Process not Found 98 PID 3144 wrote to memory of 1384 3144 Process not Found 98 PID 3144 wrote to memory of 4148 3144 Process not Found 99 PID 3144 wrote to memory of 4148 3144 Process not Found 99 PID 3144 wrote to memory of 4148 3144 Process not Found 99 PID 3144 wrote to memory of 400 3144 Process not Found 100 PID 3144 wrote to memory of 400 3144 Process not Found 100 PID 3144 wrote to memory of 400 3144 Process not Found 100 PID 3144 wrote to memory of 400 3144 Process not Found 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e2695c0e13c0c42a1e2b414631e8f120e00348aaa3b4e2b7655861d4e38e8d0.exe"C:\Users\Admin\AppData\Local\Temp\0e2695c0e13c0c42a1e2b414631e8f120e00348aaa3b4e2b7655861d4e38e8d0.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2100
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4176
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4512
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:460
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3188
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:800
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1968
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1384
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4148
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:400