Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30/06/2023, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
DaHostexeexeexe.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
DaHostexeexeexe.exe
Resource
win10v2004-20230621-en
General
-
Target
DaHostexeexeexe.exe
-
Size
299KB
-
MD5
dabf4bf05dadea76f0a7b346eee48844
-
SHA1
1ea751f2c11f8f57f80cdc30826e38a551761828
-
SHA256
4fce1d0099d746c09f6e7a8ae41882cbb95070ab24843b1516b8a74ce65d3701
-
SHA512
8dc5a9d442fd6b95ab3a1a682ad80451131da2e5f74cc741b4bd4badfbbb31f002098c79c62ef77c4677703aefc2a698e2f97becd94b1ac0d58cd71629b73f23
-
SSDEEP
3072:12zYpE8kiiX63a0mkBxKvQ5RN3vKdjSj0mRLRLh7EkHot:cMO8kWK0mkTKo5RpvUcp9Ew
Malware Config
Extracted
smokeloader
2022
http://suprememax.ga/
http://bloomberg.ga/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 1 IoCs
pid Process 3040 gvaedvd -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gvaedvd Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gvaedvd Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DaHostexeexeexe.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DaHostexeexeexe.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DaHostexeexeexe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gvaedvd -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4232 DaHostexeexeexe.exe 4232 DaHostexeexeexe.exe 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3224 Process not Found -
Suspicious behavior: MapViewOfSection 16 IoCs
pid Process 4232 DaHostexeexeexe.exe 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3224 Process not Found 3040 gvaedvd -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 3224 wrote to memory of 2496 3224 Process not Found 94 PID 3224 wrote to memory of 2496 3224 Process not Found 94 PID 3224 wrote to memory of 2496 3224 Process not Found 94 PID 3224 wrote to memory of 2496 3224 Process not Found 94 PID 3224 wrote to memory of 4556 3224 Process not Found 95 PID 3224 wrote to memory of 4556 3224 Process not Found 95 PID 3224 wrote to memory of 4556 3224 Process not Found 95 PID 3224 wrote to memory of 1784 3224 Process not Found 96 PID 3224 wrote to memory of 1784 3224 Process not Found 96 PID 3224 wrote to memory of 1784 3224 Process not Found 96 PID 3224 wrote to memory of 1784 3224 Process not Found 96 PID 3224 wrote to memory of 4056 3224 Process not Found 97 PID 3224 wrote to memory of 4056 3224 Process not Found 97 PID 3224 wrote to memory of 4056 3224 Process not Found 97 PID 3224 wrote to memory of 4056 3224 Process not Found 97 PID 3224 wrote to memory of 1760 3224 Process not Found 98 PID 3224 wrote to memory of 1760 3224 Process not Found 98 PID 3224 wrote to memory of 1760 3224 Process not Found 98 PID 3224 wrote to memory of 3608 3224 Process not Found 99 PID 3224 wrote to memory of 3608 3224 Process not Found 99 PID 3224 wrote to memory of 3608 3224 Process not Found 99 PID 3224 wrote to memory of 3608 3224 Process not Found 99 PID 3224 wrote to memory of 4608 3224 Process not Found 100 PID 3224 wrote to memory of 4608 3224 Process not Found 100 PID 3224 wrote to memory of 4608 3224 Process not Found 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DaHostexeexeexe.exe"C:\Users\Admin\AppData\Local\Temp\DaHostexeexeexe.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4232
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:2496
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4556
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1784
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4056
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1760
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3608
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4608
-
C:\Users\Admin\AppData\Roaming\gvaedvdC:\Users\Admin\AppData\Roaming\gvaedvd1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3040
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
299KB
MD5dabf4bf05dadea76f0a7b346eee48844
SHA11ea751f2c11f8f57f80cdc30826e38a551761828
SHA2564fce1d0099d746c09f6e7a8ae41882cbb95070ab24843b1516b8a74ce65d3701
SHA5128dc5a9d442fd6b95ab3a1a682ad80451131da2e5f74cc741b4bd4badfbbb31f002098c79c62ef77c4677703aefc2a698e2f97becd94b1ac0d58cd71629b73f23
-
Filesize
299KB
MD5dabf4bf05dadea76f0a7b346eee48844
SHA11ea751f2c11f8f57f80cdc30826e38a551761828
SHA2564fce1d0099d746c09f6e7a8ae41882cbb95070ab24843b1516b8a74ce65d3701
SHA5128dc5a9d442fd6b95ab3a1a682ad80451131da2e5f74cc741b4bd4badfbbb31f002098c79c62ef77c4677703aefc2a698e2f97becd94b1ac0d58cd71629b73f23