Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2023, 08:31
Static task
static1
Behavioral task
behavioral1
Sample
0a43bc29b96992aaec01af4c1a83318e1db149f8d8f216425c371b3a1400bf8e.exe
Resource
win10v2004-20230703-en
General
-
Target
0a43bc29b96992aaec01af4c1a83318e1db149f8d8f216425c371b3a1400bf8e.exe
-
Size
261KB
-
MD5
759c7436e814bf2725ff42e2bc284f3c
-
SHA1
1c5d90940e6d4983876666b03e469ceb1aa32bb0
-
SHA256
0a43bc29b96992aaec01af4c1a83318e1db149f8d8f216425c371b3a1400bf8e
-
SHA512
22df8fd0ca5495a7e3e2d6aae9d779407243b9afea0236230464818ceac20a2d8b468f2460a0f937e06961e313ddd45acc931756e52d069efc59e03171baf28e
-
SSDEEP
3072:EX0yl9VVmPf+lL/BJIBSnZD5WA1tifUdAEqe7LscTZ/vEviFBhw4o:aHT8+ZJJIBSZDh1t/CcTZ/vEwF
Malware Config
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4384 set thread context of 4524 4384 0a43bc29b96992aaec01af4c1a83318e1db149f8d8f216425c371b3a1400bf8e.exe 83 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4524 0a43bc29b96992aaec01af4c1a83318e1db149f8d8f216425c371b3a1400bf8e.exe 4524 0a43bc29b96992aaec01af4c1a83318e1db149f8d8f216425c371b3a1400bf8e.exe 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3164 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4524 0a43bc29b96992aaec01af4c1a83318e1db149f8d8f216425c371b3a1400bf8e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4384 wrote to memory of 4524 4384 0a43bc29b96992aaec01af4c1a83318e1db149f8d8f216425c371b3a1400bf8e.exe 83 PID 4384 wrote to memory of 4524 4384 0a43bc29b96992aaec01af4c1a83318e1db149f8d8f216425c371b3a1400bf8e.exe 83 PID 4384 wrote to memory of 4524 4384 0a43bc29b96992aaec01af4c1a83318e1db149f8d8f216425c371b3a1400bf8e.exe 83 PID 4384 wrote to memory of 4524 4384 0a43bc29b96992aaec01af4c1a83318e1db149f8d8f216425c371b3a1400bf8e.exe 83 PID 4384 wrote to memory of 4524 4384 0a43bc29b96992aaec01af4c1a83318e1db149f8d8f216425c371b3a1400bf8e.exe 83 PID 4384 wrote to memory of 4524 4384 0a43bc29b96992aaec01af4c1a83318e1db149f8d8f216425c371b3a1400bf8e.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a43bc29b96992aaec01af4c1a83318e1db149f8d8f216425c371b3a1400bf8e.exe"C:\Users\Admin\AppData\Local\Temp\0a43bc29b96992aaec01af4c1a83318e1db149f8d8f216425c371b3a1400bf8e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\0a43bc29b96992aaec01af4c1a83318e1db149f8d8f216425c371b3a1400bf8e.exe"C:\Users\Admin\AppData\Local\Temp\0a43bc29b96992aaec01af4c1a83318e1db149f8d8f216425c371b3a1400bf8e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4524
-