Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
068cc6785e0eccc6e37f1dd67ffcf6f0.bin.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
068cc6785e0eccc6e37f1dd67ffcf6f0.bin.exe
Resource
win10v2004-20230220-en
General
-
Target
068cc6785e0eccc6e37f1dd67ffcf6f0.bin.exe
-
Size
234KB
-
MD5
068cc6785e0eccc6e37f1dd67ffcf6f0
-
SHA1
fcfb12625183cad04ce2832f9c29908baa8039dc
-
SHA256
fc51e907d00e4bc82fda5bfec4b227e5ebf9c5ecce4acebaa24f17ecdfe5ebe8
-
SHA512
27dd069bd3871277e0527b1e9a12ad99986b7b3e9a0451c3109d64a8280eb1ff169c0e5964b7b0f6306237d6b161bfe5bde7773d6f3d42e5ba84cfba12921cf9
-
SSDEEP
3072:jPNKDILIsTh2BZxOq5APDiYbNL4pW95hbfp1I:d8sThaxOyAPLbNL42bfp1I
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 068cc6785e0eccc6e37f1dd67ffcf6f0.bin.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 068cc6785e0eccc6e37f1dd67ffcf6f0.bin.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 068cc6785e0eccc6e37f1dd67ffcf6f0.bin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1376 068cc6785e0eccc6e37f1dd67ffcf6f0.bin.exe 1376 068cc6785e0eccc6e37f1dd67ffcf6f0.bin.exe 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1268 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1376 068cc6785e0eccc6e37f1dd67ffcf6f0.bin.exe