Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16/05/2023, 18:00
Static task
static1
Behavioral task
behavioral1
Sample
0b1780772e521630e77a1f6b32201bed228a9c97134c9f462d5ac8d6b08ccae4.exe
Resource
win7-20230220-en
General
-
Target
0b1780772e521630e77a1f6b32201bed228a9c97134c9f462d5ac8d6b08ccae4.exe
-
Size
313KB
-
MD5
4db73a32cecfa765907e892b7aea8345
-
SHA1
c420d45d39f21d01bfc71eafd0750fe3cc256a63
-
SHA256
0b1780772e521630e77a1f6b32201bed228a9c97134c9f462d5ac8d6b08ccae4
-
SHA512
0007ffba3eb76a2240da84b5b8138d939dd512a6ffb59f83dfce730c5dcf06635b408c5b20bfbd99d254530e0f8bd5deb6f60b4ef49e1b5b6f558e2d3f9fd9a1
-
SSDEEP
3072:iAXPGgaSaDNJOanCLg3Tcjke0m4gyRAY0+qryYIu+PKPSvNO644vKSgI5gPc3Pgc:3+Sa5MfLgjcwTYyRAYBqryXq4SZOc
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0b1780772e521630e77a1f6b32201bed228a9c97134c9f462d5ac8d6b08ccae4.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0b1780772e521630e77a1f6b32201bed228a9c97134c9f462d5ac8d6b08ccae4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0b1780772e521630e77a1f6b32201bed228a9c97134c9f462d5ac8d6b08ccae4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1204 0b1780772e521630e77a1f6b32201bed228a9c97134c9f462d5ac8d6b08ccae4.exe 1204 0b1780772e521630e77a1f6b32201bed228a9c97134c9f462d5ac8d6b08ccae4.exe 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1232 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1204 0b1780772e521630e77a1f6b32201bed228a9c97134c9f462d5ac8d6b08ccae4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b1780772e521630e77a1f6b32201bed228a9c97134c9f462d5ac8d6b08ccae4.exe"C:\Users\Admin\AppData\Local\Temp\0b1780772e521630e77a1f6b32201bed228a9c97134c9f462d5ac8d6b08ccae4.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1204