Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2023, 21:47
Static task
static1
Behavioral task
behavioral1
Sample
c0f10b3efd057ba956f4e8403e2bffa9018b42849038162332243a926386243b.exe
Resource
win10v2004-20230703-en
General
-
Target
c0f10b3efd057ba956f4e8403e2bffa9018b42849038162332243a926386243b.exe
-
Size
243KB
-
MD5
0ec244cd37a00b1e3c1ded99f161b174
-
SHA1
2338c409dc74064b5713041dcfba32a5c74d1876
-
SHA256
c0f10b3efd057ba956f4e8403e2bffa9018b42849038162332243a926386243b
-
SHA512
35cc57b1861f34144ca8a25db07042780ccb0a369b55ff0521e66db62996cab7c8972e068842276a79966818829fa1628bf481dff8936cb89b0b5b0eaf173826
-
SSDEEP
3072:m+s3jes1aLbzj4av/19y6yrGGXW0TEkj1MKio4VHRfrC6tLus385L0nKLdg:4zes1aL/jrkrdZQ+M247DvLusq0KO
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 3036 dubbifu 4028 dubbifu -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1332 set thread context of 4832 1332 c0f10b3efd057ba956f4e8403e2bffa9018b42849038162332243a926386243b.exe 81 PID 3036 set thread context of 4028 3036 dubbifu 92 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4832 c0f10b3efd057ba956f4e8403e2bffa9018b42849038162332243a926386243b.exe 4832 c0f10b3efd057ba956f4e8403e2bffa9018b42849038162332243a926386243b.exe 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found 3128 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3128 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4832 c0f10b3efd057ba956f4e8403e2bffa9018b42849038162332243a926386243b.exe 4028 dubbifu -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3128 Process not Found Token: SeCreatePagefilePrivilege 3128 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1332 wrote to memory of 4832 1332 c0f10b3efd057ba956f4e8403e2bffa9018b42849038162332243a926386243b.exe 81 PID 1332 wrote to memory of 4832 1332 c0f10b3efd057ba956f4e8403e2bffa9018b42849038162332243a926386243b.exe 81 PID 1332 wrote to memory of 4832 1332 c0f10b3efd057ba956f4e8403e2bffa9018b42849038162332243a926386243b.exe 81 PID 1332 wrote to memory of 4832 1332 c0f10b3efd057ba956f4e8403e2bffa9018b42849038162332243a926386243b.exe 81 PID 1332 wrote to memory of 4832 1332 c0f10b3efd057ba956f4e8403e2bffa9018b42849038162332243a926386243b.exe 81 PID 1332 wrote to memory of 4832 1332 c0f10b3efd057ba956f4e8403e2bffa9018b42849038162332243a926386243b.exe 81 PID 3036 wrote to memory of 4028 3036 dubbifu 92 PID 3036 wrote to memory of 4028 3036 dubbifu 92 PID 3036 wrote to memory of 4028 3036 dubbifu 92 PID 3036 wrote to memory of 4028 3036 dubbifu 92 PID 3036 wrote to memory of 4028 3036 dubbifu 92 PID 3036 wrote to memory of 4028 3036 dubbifu 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0f10b3efd057ba956f4e8403e2bffa9018b42849038162332243a926386243b.exe"C:\Users\Admin\AppData\Local\Temp\c0f10b3efd057ba956f4e8403e2bffa9018b42849038162332243a926386243b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\c0f10b3efd057ba956f4e8403e2bffa9018b42849038162332243a926386243b.exe"C:\Users\Admin\AppData\Local\Temp\c0f10b3efd057ba956f4e8403e2bffa9018b42849038162332243a926386243b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4832
-
-
C:\Users\Admin\AppData\Roaming\dubbifuC:\Users\Admin\AppData\Roaming\dubbifu1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Roaming\dubbifuC:\Users\Admin\AppData\Roaming\dubbifu2⤵
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
PID:4028
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243KB
MD50ec244cd37a00b1e3c1ded99f161b174
SHA12338c409dc74064b5713041dcfba32a5c74d1876
SHA256c0f10b3efd057ba956f4e8403e2bffa9018b42849038162332243a926386243b
SHA51235cc57b1861f34144ca8a25db07042780ccb0a369b55ff0521e66db62996cab7c8972e068842276a79966818829fa1628bf481dff8936cb89b0b5b0eaf173826
-
Filesize
243KB
MD50ec244cd37a00b1e3c1ded99f161b174
SHA12338c409dc74064b5713041dcfba32a5c74d1876
SHA256c0f10b3efd057ba956f4e8403e2bffa9018b42849038162332243a926386243b
SHA51235cc57b1861f34144ca8a25db07042780ccb0a369b55ff0521e66db62996cab7c8972e068842276a79966818829fa1628bf481dff8936cb89b0b5b0eaf173826
-
Filesize
243KB
MD50ec244cd37a00b1e3c1ded99f161b174
SHA12338c409dc74064b5713041dcfba32a5c74d1876
SHA256c0f10b3efd057ba956f4e8403e2bffa9018b42849038162332243a926386243b
SHA51235cc57b1861f34144ca8a25db07042780ccb0a369b55ff0521e66db62996cab7c8972e068842276a79966818829fa1628bf481dff8936cb89b0b5b0eaf173826