Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
23/05/2023, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
0892ba35a28326089259d83405e59ecd7a488492a49d795f40a8e4e85a04840a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0892ba35a28326089259d83405e59ecd7a488492a49d795f40a8e4e85a04840a.exe
Resource
win10v2004-20230220-en
General
-
Target
0892ba35a28326089259d83405e59ecd7a488492a49d795f40a8e4e85a04840a.exe
-
Size
204KB
-
MD5
ff99ffe75547957144c16890c374c024
-
SHA1
38585ecdd02d4e3b57df84b0166518c8af69ecdb
-
SHA256
0892ba35a28326089259d83405e59ecd7a488492a49d795f40a8e4e85a04840a
-
SHA512
03693933205917653703bdca7c080359cc1eea9e1edc6d33abf6b2af2626694665be67fc5b56622da3dc3d67a80e565437aadc3fb7f4ec58a204612f93a1f755
-
SSDEEP
3072:QBErWPh3H58HHC5I2hOkFTzxydyfBfB5jlMAEMGY50tVDx2XTPRHyq4vCHy:RKh3MX2hzzAdypBJlGdICVDcXTRHcqS
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0892ba35a28326089259d83405e59ecd7a488492a49d795f40a8e4e85a04840a.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0892ba35a28326089259d83405e59ecd7a488492a49d795f40a8e4e85a04840a.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0892ba35a28326089259d83405e59ecd7a488492a49d795f40a8e4e85a04840a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1780 0892ba35a28326089259d83405e59ecd7a488492a49d795f40a8e4e85a04840a.exe 1780 0892ba35a28326089259d83405e59ecd7a488492a49d795f40a8e4e85a04840a.exe 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1264 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1780 0892ba35a28326089259d83405e59ecd7a488492a49d795f40a8e4e85a04840a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0892ba35a28326089259d83405e59ecd7a488492a49d795f40a8e4e85a04840a.exe"C:\Users\Admin\AppData\Local\Temp\0892ba35a28326089259d83405e59ecd7a488492a49d795f40a8e4e85a04840a.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1780