Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
234s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:35
Static task
static1
Behavioral task
behavioral1
Sample
42e66271fe0e4b5b9b9ec7509e9cdf381d48d6f39febca4d12d05402df3f8841.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
42e66271fe0e4b5b9b9ec7509e9cdf381d48d6f39febca4d12d05402df3f8841.exe
Resource
win10v2004-20230220-en
General
-
Target
42e66271fe0e4b5b9b9ec7509e9cdf381d48d6f39febca4d12d05402df3f8841.exe
-
Size
216KB
-
MD5
790f8810a2bc764c4885ac2adccd4323
-
SHA1
9a0f02744716f3ab335618d7cf2c4df82fb3b179
-
SHA256
42e66271fe0e4b5b9b9ec7509e9cdf381d48d6f39febca4d12d05402df3f8841
-
SHA512
f09d1b2573fbe043bd80fa2c7b1de49aa7cc52ffcee9a06971ef671c475020b1ce24b928b53d5aeda550d1581c984082d0c5b49775414a5eeaa658bed406971a
-
SSDEEP
3072:FIOkedd8g009KYWnmqPhhWISBm6mZPHH5K7Sj:Sedd8gaP1hhQB70PHM7S
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 42e66271fe0e4b5b9b9ec7509e9cdf381d48d6f39febca4d12d05402df3f8841.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 42e66271fe0e4b5b9b9ec7509e9cdf381d48d6f39febca4d12d05402df3f8841.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 42e66271fe0e4b5b9b9ec7509e9cdf381d48d6f39febca4d12d05402df3f8841.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 268 42e66271fe0e4b5b9b9ec7509e9cdf381d48d6f39febca4d12d05402df3f8841.exe 268 42e66271fe0e4b5b9b9ec7509e9cdf381d48d6f39febca4d12d05402df3f8841.exe 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1248 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 268 42e66271fe0e4b5b9b9ec7509e9cdf381d48d6f39febca4d12d05402df3f8841.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\42e66271fe0e4b5b9b9ec7509e9cdf381d48d6f39febca4d12d05402df3f8841.exe"C:\Users\Admin\AppData\Local\Temp\42e66271fe0e4b5b9b9ec7509e9cdf381d48d6f39febca4d12d05402df3f8841.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:268