Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
21/07/2023, 01:00
Behavioral task
behavioral1
Sample
99c0cf1dd3e620333c751d7b28d85d76c239c7fafcdaa71aeda4dc9b76c77145.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
99c0cf1dd3e620333c751d7b28d85d76c239c7fafcdaa71aeda4dc9b76c77145.exe
Resource
win10v2004-20230703-en
General
-
Target
99c0cf1dd3e620333c751d7b28d85d76c239c7fafcdaa71aeda4dc9b76c77145.exe
-
Size
30KB
-
MD5
01097d203000288cc8ef629b9b830dd2
-
SHA1
c6eec303a933ce067f5d8ac49c6efb21f61142e6
-
SHA256
99c0cf1dd3e620333c751d7b28d85d76c239c7fafcdaa71aeda4dc9b76c77145
-
SHA512
8fc00b2bd23606edeee5fd48b51f62245e491698c88461889c2fd79b60ab3e9bdb540beb4c34716d88d83806868619f5af6455742fe585959dbf26541e808afb
-
SSDEEP
384:K9VD6tee+qUOTd2opQTLAdz1SvNmhpdvOjT7PbA6HBiTSnjxZMdP05ldpRMaYIBI:k6Qe+qUv8zcqdvOXA6XkPslJvGaVW
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Deletes itself 1 IoCs
pid Process 1204 Process not Found -
Executes dropped EXE 1 IoCs
pid Process 2816 D28B.exe -
Loads dropped DLL 8 IoCs
pid Process 2700 rundll32.exe 2700 rundll32.exe 2700 rundll32.exe 2700 rundll32.exe 972 rundll32.exe 972 rundll32.exe 972 rundll32.exe 972 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 99c0cf1dd3e620333c751d7b28d85d76c239c7fafcdaa71aeda4dc9b76c77145.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 99c0cf1dd3e620333c751d7b28d85d76c239c7fafcdaa71aeda4dc9b76c77145.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 99c0cf1dd3e620333c751d7b28d85d76c239c7fafcdaa71aeda4dc9b76c77145.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1912 99c0cf1dd3e620333c751d7b28d85d76c239c7fafcdaa71aeda4dc9b76c77145.exe 1912 99c0cf1dd3e620333c751d7b28d85d76c239c7fafcdaa71aeda4dc9b76c77145.exe 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1204 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1912 99c0cf1dd3e620333c751d7b28d85d76c239c7fafcdaa71aeda4dc9b76c77145.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1204 Process not Found -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2816 1204 Process not Found 30 PID 1204 wrote to memory of 2816 1204 Process not Found 30 PID 1204 wrote to memory of 2816 1204 Process not Found 30 PID 1204 wrote to memory of 2816 1204 Process not Found 30 PID 2816 wrote to memory of 2920 2816 D28B.exe 31 PID 2816 wrote to memory of 2920 2816 D28B.exe 31 PID 2816 wrote to memory of 2920 2816 D28B.exe 31 PID 2816 wrote to memory of 2920 2816 D28B.exe 31 PID 2920 wrote to memory of 2700 2920 control.exe 32 PID 2920 wrote to memory of 2700 2920 control.exe 32 PID 2920 wrote to memory of 2700 2920 control.exe 32 PID 2920 wrote to memory of 2700 2920 control.exe 32 PID 2920 wrote to memory of 2700 2920 control.exe 32 PID 2920 wrote to memory of 2700 2920 control.exe 32 PID 2920 wrote to memory of 2700 2920 control.exe 32 PID 2700 wrote to memory of 1144 2700 rundll32.exe 33 PID 2700 wrote to memory of 1144 2700 rundll32.exe 33 PID 2700 wrote to memory of 1144 2700 rundll32.exe 33 PID 2700 wrote to memory of 1144 2700 rundll32.exe 33 PID 1144 wrote to memory of 972 1144 RunDll32.exe 34 PID 1144 wrote to memory of 972 1144 RunDll32.exe 34 PID 1144 wrote to memory of 972 1144 RunDll32.exe 34 PID 1144 wrote to memory of 972 1144 RunDll32.exe 34 PID 1144 wrote to memory of 972 1144 RunDll32.exe 34 PID 1144 wrote to memory of 972 1144 RunDll32.exe 34 PID 1144 wrote to memory of 972 1144 RunDll32.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\99c0cf1dd3e620333c751d7b28d85d76c239c7fafcdaa71aeda4dc9b76c77145.exe"C:\Users\Admin\AppData\Local\Temp\99c0cf1dd3e620333c751d7b28d85d76c239c7fafcdaa71aeda4dc9b76c77145.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1912
-
C:\Users\Admin\AppData\Local\Temp\D28B.exeC:\Users\Admin\AppData\Local\Temp\D28B.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\AZUAWK.CPL",2⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\AZUAWK.CPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\AZUAWK.CPL",4⤵
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\AZUAWK.CPL",5⤵
- Loads dropped DLL
PID:972
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD56678ff541ad68a47a8bbbe217ab739f8
SHA13a43e3a903f217b3dae55837877bfa53f6db0019
SHA256f9e2d9fb4044a1025e27eaa3280db5cb042be491edbe29d3c86f543377f99d17
SHA512b9541aa2a54383ba55ce7cce13434d8a82c4d77eda39e8144f903af0ff74a2d8f712ca2abe437b4094b18ec19c3f8a337a15c2fc12c0d14181f35b986f4c4db6
-
Filesize
1.5MB
MD5985f48adeb0b295a4975f767303e2a09
SHA189709c33a4fb3683b4932bbd93f0857bfdd746e3
SHA2561bbe3ed2b3cbc696f1ffdf45dd12b02f367ff165e5ffe12bb3efb82104817eea
SHA5125e105ab03e00ec9b91d7efc65fdc786cc6be2d10f8f7d9d4caa3742c4fae6c6085dc789f2ccb3320c59bc31bbabf2f06161e43a18490b07c5095566746729832
-
Filesize
1.5MB
MD5985f48adeb0b295a4975f767303e2a09
SHA189709c33a4fb3683b4932bbd93f0857bfdd746e3
SHA2561bbe3ed2b3cbc696f1ffdf45dd12b02f367ff165e5ffe12bb3efb82104817eea
SHA5125e105ab03e00ec9b91d7efc65fdc786cc6be2d10f8f7d9d4caa3742c4fae6c6085dc789f2ccb3320c59bc31bbabf2f06161e43a18490b07c5095566746729832
-
Filesize
1.2MB
MD56678ff541ad68a47a8bbbe217ab739f8
SHA13a43e3a903f217b3dae55837877bfa53f6db0019
SHA256f9e2d9fb4044a1025e27eaa3280db5cb042be491edbe29d3c86f543377f99d17
SHA512b9541aa2a54383ba55ce7cce13434d8a82c4d77eda39e8144f903af0ff74a2d8f712ca2abe437b4094b18ec19c3f8a337a15c2fc12c0d14181f35b986f4c4db6
-
Filesize
1.2MB
MD56678ff541ad68a47a8bbbe217ab739f8
SHA13a43e3a903f217b3dae55837877bfa53f6db0019
SHA256f9e2d9fb4044a1025e27eaa3280db5cb042be491edbe29d3c86f543377f99d17
SHA512b9541aa2a54383ba55ce7cce13434d8a82c4d77eda39e8144f903af0ff74a2d8f712ca2abe437b4094b18ec19c3f8a337a15c2fc12c0d14181f35b986f4c4db6
-
Filesize
1.2MB
MD56678ff541ad68a47a8bbbe217ab739f8
SHA13a43e3a903f217b3dae55837877bfa53f6db0019
SHA256f9e2d9fb4044a1025e27eaa3280db5cb042be491edbe29d3c86f543377f99d17
SHA512b9541aa2a54383ba55ce7cce13434d8a82c4d77eda39e8144f903af0ff74a2d8f712ca2abe437b4094b18ec19c3f8a337a15c2fc12c0d14181f35b986f4c4db6
-
Filesize
1.2MB
MD56678ff541ad68a47a8bbbe217ab739f8
SHA13a43e3a903f217b3dae55837877bfa53f6db0019
SHA256f9e2d9fb4044a1025e27eaa3280db5cb042be491edbe29d3c86f543377f99d17
SHA512b9541aa2a54383ba55ce7cce13434d8a82c4d77eda39e8144f903af0ff74a2d8f712ca2abe437b4094b18ec19c3f8a337a15c2fc12c0d14181f35b986f4c4db6
-
Filesize
1.2MB
MD56678ff541ad68a47a8bbbe217ab739f8
SHA13a43e3a903f217b3dae55837877bfa53f6db0019
SHA256f9e2d9fb4044a1025e27eaa3280db5cb042be491edbe29d3c86f543377f99d17
SHA512b9541aa2a54383ba55ce7cce13434d8a82c4d77eda39e8144f903af0ff74a2d8f712ca2abe437b4094b18ec19c3f8a337a15c2fc12c0d14181f35b986f4c4db6
-
Filesize
1.2MB
MD56678ff541ad68a47a8bbbe217ab739f8
SHA13a43e3a903f217b3dae55837877bfa53f6db0019
SHA256f9e2d9fb4044a1025e27eaa3280db5cb042be491edbe29d3c86f543377f99d17
SHA512b9541aa2a54383ba55ce7cce13434d8a82c4d77eda39e8144f903af0ff74a2d8f712ca2abe437b4094b18ec19c3f8a337a15c2fc12c0d14181f35b986f4c4db6
-
Filesize
1.2MB
MD56678ff541ad68a47a8bbbe217ab739f8
SHA13a43e3a903f217b3dae55837877bfa53f6db0019
SHA256f9e2d9fb4044a1025e27eaa3280db5cb042be491edbe29d3c86f543377f99d17
SHA512b9541aa2a54383ba55ce7cce13434d8a82c4d77eda39e8144f903af0ff74a2d8f712ca2abe437b4094b18ec19c3f8a337a15c2fc12c0d14181f35b986f4c4db6
-
Filesize
1.2MB
MD56678ff541ad68a47a8bbbe217ab739f8
SHA13a43e3a903f217b3dae55837877bfa53f6db0019
SHA256f9e2d9fb4044a1025e27eaa3280db5cb042be491edbe29d3c86f543377f99d17
SHA512b9541aa2a54383ba55ce7cce13434d8a82c4d77eda39e8144f903af0ff74a2d8f712ca2abe437b4094b18ec19c3f8a337a15c2fc12c0d14181f35b986f4c4db6