Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2023, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
498f06845948a2337f1137db79e3dc88268bd6a4a4be1adf1121be3b9368ce5c.exe
Resource
win10v2004-20230703-en
General
-
Target
498f06845948a2337f1137db79e3dc88268bd6a4a4be1adf1121be3b9368ce5c.exe
-
Size
296KB
-
MD5
c5a17567b9a98b45b0a82097bc72b4df
-
SHA1
2ed982eb60245dedb154e75b1e27f0046f3a300c
-
SHA256
498f06845948a2337f1137db79e3dc88268bd6a4a4be1adf1121be3b9368ce5c
-
SHA512
565a61cd23461c8ba862f1d4e1d3d444549a713a9a8f0c2f63a137cd21a233c027ffa9162dfe6d2bd814bcd83e167013b861407135ffc03e396da5d1f5d77a9d
-
SSDEEP
3072:aRFH7IV1AlyXFakSxvCdag2o78MPAQTblpMN9myoZrvjkK:YFba1AlyVt8CcC7dA2lpMN4rZr
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 2176 egrtvha 2992 egrtvha -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4900 set thread context of 3532 4900 498f06845948a2337f1137db79e3dc88268bd6a4a4be1adf1121be3b9368ce5c.exe 88 PID 2176 set thread context of 2992 2176 egrtvha 102 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3532 498f06845948a2337f1137db79e3dc88268bd6a4a4be1adf1121be3b9368ce5c.exe 3532 498f06845948a2337f1137db79e3dc88268bd6a4a4be1adf1121be3b9368ce5c.exe 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3220 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3532 498f06845948a2337f1137db79e3dc88268bd6a4a4be1adf1121be3b9368ce5c.exe 2992 egrtvha -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 3220 Process not Found Token: SeCreatePagefilePrivilege 3220 Process not Found Token: SeShutdownPrivilege 3220 Process not Found Token: SeCreatePagefilePrivilege 3220 Process not Found Token: SeShutdownPrivilege 3220 Process not Found Token: SeCreatePagefilePrivilege 3220 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3220 Process not Found 3220 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4900 wrote to memory of 3532 4900 498f06845948a2337f1137db79e3dc88268bd6a4a4be1adf1121be3b9368ce5c.exe 88 PID 4900 wrote to memory of 3532 4900 498f06845948a2337f1137db79e3dc88268bd6a4a4be1adf1121be3b9368ce5c.exe 88 PID 4900 wrote to memory of 3532 4900 498f06845948a2337f1137db79e3dc88268bd6a4a4be1adf1121be3b9368ce5c.exe 88 PID 4900 wrote to memory of 3532 4900 498f06845948a2337f1137db79e3dc88268bd6a4a4be1adf1121be3b9368ce5c.exe 88 PID 4900 wrote to memory of 3532 4900 498f06845948a2337f1137db79e3dc88268bd6a4a4be1adf1121be3b9368ce5c.exe 88 PID 4900 wrote to memory of 3532 4900 498f06845948a2337f1137db79e3dc88268bd6a4a4be1adf1121be3b9368ce5c.exe 88 PID 2176 wrote to memory of 2992 2176 egrtvha 102 PID 2176 wrote to memory of 2992 2176 egrtvha 102 PID 2176 wrote to memory of 2992 2176 egrtvha 102 PID 2176 wrote to memory of 2992 2176 egrtvha 102 PID 2176 wrote to memory of 2992 2176 egrtvha 102 PID 2176 wrote to memory of 2992 2176 egrtvha 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\498f06845948a2337f1137db79e3dc88268bd6a4a4be1adf1121be3b9368ce5c.exe"C:\Users\Admin\AppData\Local\Temp\498f06845948a2337f1137db79e3dc88268bd6a4a4be1adf1121be3b9368ce5c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\498f06845948a2337f1137db79e3dc88268bd6a4a4be1adf1121be3b9368ce5c.exe"C:\Users\Admin\AppData\Local\Temp\498f06845948a2337f1137db79e3dc88268bd6a4a4be1adf1121be3b9368ce5c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3532
-
-
C:\Users\Admin\AppData\Roaming\egrtvhaC:\Users\Admin\AppData\Roaming\egrtvha1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Roaming\egrtvhaC:\Users\Admin\AppData\Roaming\egrtvha2⤵
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
PID:2992
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296KB
MD5c5a17567b9a98b45b0a82097bc72b4df
SHA12ed982eb60245dedb154e75b1e27f0046f3a300c
SHA256498f06845948a2337f1137db79e3dc88268bd6a4a4be1adf1121be3b9368ce5c
SHA512565a61cd23461c8ba862f1d4e1d3d444549a713a9a8f0c2f63a137cd21a233c027ffa9162dfe6d2bd814bcd83e167013b861407135ffc03e396da5d1f5d77a9d
-
Filesize
296KB
MD5c5a17567b9a98b45b0a82097bc72b4df
SHA12ed982eb60245dedb154e75b1e27f0046f3a300c
SHA256498f06845948a2337f1137db79e3dc88268bd6a4a4be1adf1121be3b9368ce5c
SHA512565a61cd23461c8ba862f1d4e1d3d444549a713a9a8f0c2f63a137cd21a233c027ffa9162dfe6d2bd814bcd83e167013b861407135ffc03e396da5d1f5d77a9d
-
Filesize
296KB
MD5c5a17567b9a98b45b0a82097bc72b4df
SHA12ed982eb60245dedb154e75b1e27f0046f3a300c
SHA256498f06845948a2337f1137db79e3dc88268bd6a4a4be1adf1121be3b9368ce5c
SHA512565a61cd23461c8ba862f1d4e1d3d444549a713a9a8f0c2f63a137cd21a233c027ffa9162dfe6d2bd814bcd83e167013b861407135ffc03e396da5d1f5d77a9d