Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
21/07/2023, 06:00
Static task
static1
Behavioral task
behavioral1
Sample
RFQ# RE-2301707.xls
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
RFQ# RE-2301707.xls
Resource
win10v2004-20230703-en
General
-
Target
RFQ# RE-2301707.xls
-
Size
1.2MB
-
MD5
b9b21e99991c542b6c2298548c004f28
-
SHA1
09ab1bbc0baff1fee59e5409303297d9d2e80c47
-
SHA256
ceeb7b4c98464f0429796c743d1c78e2d18c331c4e7c87448440726b7531e1d1
-
SHA512
a9693452c08a496ec9063500d328d0772b45fc4b688557497593cda36cc291d760b70af3fce5b308d73ecc227f0ae0408365b3177e3185337624c2e226028713
-
SSDEEP
24576:90nKZyUw6Vtln+Zykw6VINX0wI6XiHP5n2wyL/gGD1p3H:90U06Vtlok6V+X35iPdxe/gON
Malware Config
Extracted
smokeloader
2022
http://cletonmy.com/
http://alpatrik.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2888 EQNEDT32.EXE -
Downloads MZ/PE file
-
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe IBM_Linux.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe IBM_Linux.exe -
Executes dropped EXE 1 IoCs
pid Process 3024 IBM_Linux.exe -
Loads dropped DLL 4 IoCs
pid Process 2888 EQNEDT32.EXE 3024 IBM_Linux.exe 3024 IBM_Linux.exe 1972 IBM_Linux.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1972 IBM_Linux.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3024 IBM_Linux.exe 1972 IBM_Linux.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3024 set thread context of 1972 3024 IBM_Linux.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 12 IoCs
resource yara_rule behavioral1/files/0x000500000001944f-67.dat nsis_installer_1 behavioral1/files/0x000500000001944f-67.dat nsis_installer_2 behavioral1/files/0x000500000001944f-68.dat nsis_installer_1 behavioral1/files/0x000500000001944f-68.dat nsis_installer_2 behavioral1/files/0x000500000001944f-71.dat nsis_installer_1 behavioral1/files/0x000500000001944f-71.dat nsis_installer_2 behavioral1/files/0x000500000001944f-72.dat nsis_installer_1 behavioral1/files/0x000500000001944f-72.dat nsis_installer_2 behavioral1/files/0x000500000001944f-84.dat nsis_installer_1 behavioral1/files/0x000500000001944f-84.dat nsis_installer_2 behavioral1/files/0x000500000001944f-86.dat nsis_installer_1 behavioral1/files/0x000500000001944f-86.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI IBM_Linux.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI IBM_Linux.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI IBM_Linux.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
pid Process 2888 EQNEDT32.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2592 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1972 IBM_Linux.exe 1972 IBM_Linux.exe 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1180 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3024 IBM_Linux.exe 1972 IBM_Linux.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 1180 Process not Found Token: SeShutdownPrivilege 1180 Process not Found -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2592 EXCEL.EXE 2592 EXCEL.EXE 2592 EXCEL.EXE 2592 EXCEL.EXE 2592 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2888 wrote to memory of 3024 2888 EQNEDT32.EXE 29 PID 2888 wrote to memory of 3024 2888 EQNEDT32.EXE 29 PID 2888 wrote to memory of 3024 2888 EQNEDT32.EXE 29 PID 2888 wrote to memory of 3024 2888 EQNEDT32.EXE 29 PID 3024 wrote to memory of 1972 3024 IBM_Linux.exe 33 PID 3024 wrote to memory of 1972 3024 IBM_Linux.exe 33 PID 3024 wrote to memory of 1972 3024 IBM_Linux.exe 33 PID 3024 wrote to memory of 1972 3024 IBM_Linux.exe 33 PID 3024 wrote to memory of 1972 3024 IBM_Linux.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\RFQ# RE-2301707.xls"1⤵
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2592
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\IBM_Linux.exe"C:\Users\Admin\AppData\Local\Temp\IBM_Linux.exe"2⤵
- Checks QEMU agent file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\IBM_Linux.exe"C:\Users\Admin\AppData\Local\Temp\IBM_Linux.exe"3⤵
- Checks QEMU agent file
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1972
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5a01b9617553432807b9b58025b338d97
SHA1439bdcc450408b9735b2428c2d53d2e6977fa58c
SHA2567a0426ed2e2349916969ff7087c0f76089fb8ce7f4627f3d11ccbc1aaefcedce
SHA512312cc2563fa865d6a939fea85a520627c73ed9a95bafc98c89495f21d535dc658825be74b64f0f5c5815d1d234fc6e77a71779247e4973e39ba8dccec2f09bee
-
Filesize
395KB
MD5dede170df1b43a3d2e0095af1e16f7d5
SHA1da3732c14024ea58bff773c7a2f5317c83041920
SHA25630fecff47896754fe3c4fe3c748827d98f1ea1d5c0654bb229f7784e3521f148
SHA512dd7816592feb25c2881760652ad03393f20856186091cb187107339ad74e682af348b3edaf0b792417b6ef4099e08060ed7aeff1d082ab36c73d3000bea3b15e
-
Filesize
395KB
MD5dede170df1b43a3d2e0095af1e16f7d5
SHA1da3732c14024ea58bff773c7a2f5317c83041920
SHA25630fecff47896754fe3c4fe3c748827d98f1ea1d5c0654bb229f7784e3521f148
SHA512dd7816592feb25c2881760652ad03393f20856186091cb187107339ad74e682af348b3edaf0b792417b6ef4099e08060ed7aeff1d082ab36c73d3000bea3b15e
-
Filesize
395KB
MD5dede170df1b43a3d2e0095af1e16f7d5
SHA1da3732c14024ea58bff773c7a2f5317c83041920
SHA25630fecff47896754fe3c4fe3c748827d98f1ea1d5c0654bb229f7784e3521f148
SHA512dd7816592feb25c2881760652ad03393f20856186091cb187107339ad74e682af348b3edaf0b792417b6ef4099e08060ed7aeff1d082ab36c73d3000bea3b15e
-
Filesize
395KB
MD5dede170df1b43a3d2e0095af1e16f7d5
SHA1da3732c14024ea58bff773c7a2f5317c83041920
SHA25630fecff47896754fe3c4fe3c748827d98f1ea1d5c0654bb229f7784e3521f148
SHA512dd7816592feb25c2881760652ad03393f20856186091cb187107339ad74e682af348b3edaf0b792417b6ef4099e08060ed7aeff1d082ab36c73d3000bea3b15e
-
Filesize
395KB
MD5dede170df1b43a3d2e0095af1e16f7d5
SHA1da3732c14024ea58bff773c7a2f5317c83041920
SHA25630fecff47896754fe3c4fe3c748827d98f1ea1d5c0654bb229f7784e3521f148
SHA512dd7816592feb25c2881760652ad03393f20856186091cb187107339ad74e682af348b3edaf0b792417b6ef4099e08060ed7aeff1d082ab36c73d3000bea3b15e
-
Filesize
395KB
MD5dede170df1b43a3d2e0095af1e16f7d5
SHA1da3732c14024ea58bff773c7a2f5317c83041920
SHA25630fecff47896754fe3c4fe3c748827d98f1ea1d5c0654bb229f7784e3521f148
SHA512dd7816592feb25c2881760652ad03393f20856186091cb187107339ad74e682af348b3edaf0b792417b6ef4099e08060ed7aeff1d082ab36c73d3000bea3b15e
-
Filesize
11KB
MD5fccff8cb7a1067e23fd2e2b63971a8e1
SHA130e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA2566fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c