Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18/05/2023, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
startup.dll.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
startup.dll.exe
Resource
win10v2004-20230220-en
General
-
Target
startup.dll.exe
-
Size
216KB
-
MD5
33d60a6162d7c6c1f48f96c770ba8dc3
-
SHA1
6e9e1c3f7d570756e51a95d1add013a70340fd19
-
SHA256
cfbcaceb818ccb9659325848991f7825d682e790abecc15cf6418d3577f1f0c5
-
SHA512
ac9b80376166ceea1a612ccecab67ddb0b220003099efeaebcddae7bf96001118611b05263be32ca1cd581765fae920bd7ceae256ea7380cab39e967d5cf7c44
-
SSDEEP
3072:8wo8lMoohg9X4FmOpS3Td4pDwhDOXG9X7ZOqzm0mDrj0RtP5y:Flp9IFLpSd4pKOsX7ZOwmVDERS
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Extracted
vidar
3.9
da3b70a6d41764717ff479f0edd50071
https://steamcommunity.com/profiles/76561199263069598
https://t.me/cybehost
-
profile_id_v2
da3b70a6d41764717ff479f0edd50071
-
user_agent
Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.7 (like Gecko) (Debian)
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 1412 77B0.exe 4368 77B0.exe 2760 8231.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2760 8231.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1412 set thread context of 4368 1412 77B0.exe 94 -
Program crash 1 IoCs
pid pid_target Process procid_target 452 4368 WerFault.exe 94 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI startup.dll.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI startup.dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI startup.dll.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2820 startup.dll.exe 2820 startup.dll.exe 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3140 Process not Found -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 2820 startup.dll.exe 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeShutdownPrivilege 3140 Process not Found Token: SeCreatePagefilePrivilege 3140 Process not Found Token: SeShutdownPrivilege 3140 Process not Found Token: SeCreatePagefilePrivilege 3140 Process not Found Token: SeLoadDriverPrivilege 2760 8231.exe Token: SeShutdownPrivilege 3140 Process not Found Token: SeCreatePagefilePrivilege 3140 Process not Found Token: SeShutdownPrivilege 3140 Process not Found Token: SeCreatePagefilePrivilege 3140 Process not Found Token: SeShutdownPrivilege 3140 Process not Found Token: SeCreatePagefilePrivilege 3140 Process not Found -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3140 wrote to memory of 1412 3140 Process not Found 93 PID 3140 wrote to memory of 1412 3140 Process not Found 93 PID 3140 wrote to memory of 1412 3140 Process not Found 93 PID 1412 wrote to memory of 4368 1412 77B0.exe 94 PID 1412 wrote to memory of 4368 1412 77B0.exe 94 PID 1412 wrote to memory of 4368 1412 77B0.exe 94 PID 1412 wrote to memory of 4368 1412 77B0.exe 94 PID 1412 wrote to memory of 4368 1412 77B0.exe 94 PID 1412 wrote to memory of 4368 1412 77B0.exe 94 PID 1412 wrote to memory of 4368 1412 77B0.exe 94 PID 1412 wrote to memory of 4368 1412 77B0.exe 94 PID 1412 wrote to memory of 4368 1412 77B0.exe 94 PID 3140 wrote to memory of 2760 3140 Process not Found 97 PID 3140 wrote to memory of 2760 3140 Process not Found 97 PID 3140 wrote to memory of 2760 3140 Process not Found 97 PID 3140 wrote to memory of 1316 3140 Process not Found 98 PID 3140 wrote to memory of 1316 3140 Process not Found 98 PID 3140 wrote to memory of 1316 3140 Process not Found 98 PID 3140 wrote to memory of 1316 3140 Process not Found 98 PID 3140 wrote to memory of 4316 3140 Process not Found 99 PID 3140 wrote to memory of 4316 3140 Process not Found 99 PID 3140 wrote to memory of 4316 3140 Process not Found 99 PID 3140 wrote to memory of 1996 3140 Process not Found 100 PID 3140 wrote to memory of 1996 3140 Process not Found 100 PID 3140 wrote to memory of 1996 3140 Process not Found 100 PID 3140 wrote to memory of 1996 3140 Process not Found 100 PID 3140 wrote to memory of 4732 3140 Process not Found 101 PID 3140 wrote to memory of 4732 3140 Process not Found 101 PID 3140 wrote to memory of 4732 3140 Process not Found 101 PID 3140 wrote to memory of 2084 3140 Process not Found 102 PID 3140 wrote to memory of 2084 3140 Process not Found 102 PID 3140 wrote to memory of 2084 3140 Process not Found 102 PID 3140 wrote to memory of 2084 3140 Process not Found 102 PID 3140 wrote to memory of 472 3140 Process not Found 103 PID 3140 wrote to memory of 472 3140 Process not Found 103 PID 3140 wrote to memory of 472 3140 Process not Found 103 PID 3140 wrote to memory of 472 3140 Process not Found 103 PID 3140 wrote to memory of 2104 3140 Process not Found 104 PID 3140 wrote to memory of 2104 3140 Process not Found 104 PID 3140 wrote to memory of 2104 3140 Process not Found 104 PID 3140 wrote to memory of 2104 3140 Process not Found 104 PID 3140 wrote to memory of 3240 3140 Process not Found 105 PID 3140 wrote to memory of 3240 3140 Process not Found 105 PID 3140 wrote to memory of 3240 3140 Process not Found 105 PID 3140 wrote to memory of 4760 3140 Process not Found 106 PID 3140 wrote to memory of 4760 3140 Process not Found 106 PID 3140 wrote to memory of 4760 3140 Process not Found 106 PID 3140 wrote to memory of 4760 3140 Process not Found 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\startup.dll.exe"C:\Users\Admin\AppData\Local\Temp\startup.dll.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2820
-
C:\Users\Admin\AppData\Local\Temp\77B0.exeC:\Users\Admin\AppData\Local\Temp\77B0.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\77B0.exe"C:\Users\Admin\AppData\Local\Temp\77B0.exe"2⤵
- Executes dropped EXE
PID:4368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 3443⤵
- Program crash
PID:452
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4368 -ip 43681⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\8231.exeC:\Users\Admin\AppData\Local\Temp\8231.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1316
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4316
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1996
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4732
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2084
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:472
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2104
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3240
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4760
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
552KB
MD5de27e688202b4fc37b916962b4060c67
SHA13e657e69e5c3b3a9e0ed5354e8f28a80b3552599
SHA25684fc76615347be1aea7e2a4625c7cf5973cee76865bd85c0da51e5303d242cb4
SHA5125232858ea01f670f7d3bed374c7a403c4374db65b270487add630b81fc5251cf074a9c07017e077af97bb72728e95dbe496cbfb28b7e929116e5468f2c845ec4
-
Filesize
552KB
MD5de27e688202b4fc37b916962b4060c67
SHA13e657e69e5c3b3a9e0ed5354e8f28a80b3552599
SHA25684fc76615347be1aea7e2a4625c7cf5973cee76865bd85c0da51e5303d242cb4
SHA5125232858ea01f670f7d3bed374c7a403c4374db65b270487add630b81fc5251cf074a9c07017e077af97bb72728e95dbe496cbfb28b7e929116e5468f2c845ec4
-
Filesize
552KB
MD5de27e688202b4fc37b916962b4060c67
SHA13e657e69e5c3b3a9e0ed5354e8f28a80b3552599
SHA25684fc76615347be1aea7e2a4625c7cf5973cee76865bd85c0da51e5303d242cb4
SHA5125232858ea01f670f7d3bed374c7a403c4374db65b270487add630b81fc5251cf074a9c07017e077af97bb72728e95dbe496cbfb28b7e929116e5468f2c845ec4
-
Filesize
316KB
MD5cd4121ea74cbd684bdf3a08c0aaf54a4
SHA1ee87db3dd134332b815d17d717b1ed36939dfa35
SHA2564ebe4e62066ac10efc23e7b63e421cc153b426e036309dbf99e4a4aa97122782
SHA512af2b1ee11be992295a932fb6bf6221a077c33823367e5f26aa7b4f9bdd573482a67b2dab90cc778096cd57bf5892adc0678d23fe73de39c29f9377b1835ca100
-
Filesize
316KB
MD5cd4121ea74cbd684bdf3a08c0aaf54a4
SHA1ee87db3dd134332b815d17d717b1ed36939dfa35
SHA2564ebe4e62066ac10efc23e7b63e421cc153b426e036309dbf99e4a4aa97122782
SHA512af2b1ee11be992295a932fb6bf6221a077c33823367e5f26aa7b4f9bdd573482a67b2dab90cc778096cd57bf5892adc0678d23fe73de39c29f9377b1835ca100