Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
30s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2023, 01:51
Static task
static1
Behavioral task
behavioral1
Sample
e7cf7131e4c2578bb51fe33d2b6670622233c651a86827a461aa7b081e19b99e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e7cf7131e4c2578bb51fe33d2b6670622233c651a86827a461aa7b081e19b99e.exe
Resource
win10v2004-20230915-en
General
-
Target
e7cf7131e4c2578bb51fe33d2b6670622233c651a86827a461aa7b081e19b99e.exe
-
Size
227KB
-
MD5
7c5940c3eb79c3a97f4e98f1a8dac782
-
SHA1
906603a5e1b79584844fffe441af49bde89f73ce
-
SHA256
e7cf7131e4c2578bb51fe33d2b6670622233c651a86827a461aa7b081e19b99e
-
SHA512
5debcb8dd3b8fd783a177625c0744f36fbaa86058b67b84a9ffb8e8c57a41e0f980a86ffcdca991b9d7d49b7b34a87e99b840c8fb5d2ffecb53b8d2ba718d9fb
-
SSDEEP
3072:gEs7fZA+gkMbHfHWhv5zbSftq4SovLD8h1w:0fm+gz7fuVuY42h
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
Extracted
redline
lux3
176.123.9.142:14845
-
auth_value
e94dff9a76da90d6b000642c4a52574b
Extracted
redline
38.181.25.43:3325
-
auth_value
082cde17c5630749ecb0376734fe99c9
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.38.95.107:42494
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/4720-164-0x0000000003820000-0x0000000003951000-memory.dmp family_fabookie behavioral2/memory/4720-168-0x0000000003820000-0x0000000003951000-memory.dmp family_fabookie -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 3396 A2C.exe 1612 B08.exe 4952 BC5.exe 2548 DE9.exe 2664 FAF.exe -
Loads dropped DLL 1 IoCs
pid Process 2060 regsvr32.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e7cf7131e4c2578bb51fe33d2b6670622233c651a86827a461aa7b081e19b99e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e7cf7131e4c2578bb51fe33d2b6670622233c651a86827a461aa7b081e19b99e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e7cf7131e4c2578bb51fe33d2b6670622233c651a86827a461aa7b081e19b99e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4308 e7cf7131e4c2578bb51fe33d2b6670622233c651a86827a461aa7b081e19b99e.exe 4308 e7cf7131e4c2578bb51fe33d2b6670622233c651a86827a461aa7b081e19b99e.exe 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4308 e7cf7131e4c2578bb51fe33d2b6670622233c651a86827a461aa7b081e19b99e.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 3164 Process not Found Token: SeCreatePagefilePrivilege 3164 Process not Found Token: SeShutdownPrivilege 3164 Process not Found Token: SeCreatePagefilePrivilege 3164 Process not Found Token: SeShutdownPrivilege 3164 Process not Found Token: SeCreatePagefilePrivilege 3164 Process not Found Token: SeShutdownPrivilege 3164 Process not Found Token: SeCreatePagefilePrivilege 3164 Process not Found Token: SeShutdownPrivilege 3164 Process not Found Token: SeCreatePagefilePrivilege 3164 Process not Found Token: SeShutdownPrivilege 3164 Process not Found Token: SeCreatePagefilePrivilege 3164 Process not Found Token: SeShutdownPrivilege 3164 Process not Found Token: SeCreatePagefilePrivilege 3164 Process not Found Token: SeShutdownPrivilege 3164 Process not Found Token: SeCreatePagefilePrivilege 3164 Process not Found Token: SeShutdownPrivilege 3164 Process not Found Token: SeCreatePagefilePrivilege 3164 Process not Found Token: SeShutdownPrivilege 3164 Process not Found Token: SeCreatePagefilePrivilege 3164 Process not Found Token: SeShutdownPrivilege 3164 Process not Found Token: SeCreatePagefilePrivilege 3164 Process not Found Token: SeShutdownPrivilege 3164 Process not Found Token: SeCreatePagefilePrivilege 3164 Process not Found -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3164 wrote to memory of 3396 3164 Process not Found 83 PID 3164 wrote to memory of 3396 3164 Process not Found 83 PID 3164 wrote to memory of 3396 3164 Process not Found 83 PID 3164 wrote to memory of 1612 3164 Process not Found 84 PID 3164 wrote to memory of 1612 3164 Process not Found 84 PID 3164 wrote to memory of 1612 3164 Process not Found 84 PID 3164 wrote to memory of 4952 3164 Process not Found 86 PID 3164 wrote to memory of 4952 3164 Process not Found 86 PID 3164 wrote to memory of 4952 3164 Process not Found 86 PID 3164 wrote to memory of 2548 3164 Process not Found 88 PID 3164 wrote to memory of 2548 3164 Process not Found 88 PID 3164 wrote to memory of 2548 3164 Process not Found 88 PID 3164 wrote to memory of 2664 3164 Process not Found 90 PID 3164 wrote to memory of 2664 3164 Process not Found 90 PID 3164 wrote to memory of 2664 3164 Process not Found 90 PID 3164 wrote to memory of 2868 3164 Process not Found 91 PID 3164 wrote to memory of 2868 3164 Process not Found 91 PID 2868 wrote to memory of 2060 2868 regsvr32.exe 92 PID 2868 wrote to memory of 2060 2868 regsvr32.exe 92 PID 2868 wrote to memory of 2060 2868 regsvr32.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7cf7131e4c2578bb51fe33d2b6670622233c651a86827a461aa7b081e19b99e.exe"C:\Users\Admin\AppData\Local\Temp\e7cf7131e4c2578bb51fe33d2b6670622233c651a86827a461aa7b081e19b99e.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4308
-
C:\Users\Admin\AppData\Local\Temp\A2C.exeC:\Users\Admin\AppData\Local\Temp\A2C.exe1⤵
- Executes dropped EXE
PID:3396
-
C:\Users\Admin\AppData\Local\Temp\B08.exeC:\Users\Admin\AppData\Local\Temp\B08.exe1⤵
- Executes dropped EXE
PID:1612
-
C:\Users\Admin\AppData\Local\Temp\BC5.exeC:\Users\Admin\AppData\Local\Temp\BC5.exe1⤵
- Executes dropped EXE
PID:4952
-
C:\Users\Admin\AppData\Local\Temp\DE9.exeC:\Users\Admin\AppData\Local\Temp\DE9.exe1⤵
- Executes dropped EXE
PID:2548 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:3852
-
-
C:\Users\Admin\AppData\Local\Temp\FAF.exeC:\Users\Admin\AppData\Local\Temp\FAF.exe1⤵
- Executes dropped EXE
PID:2664
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\1638.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\1638.dll2⤵
- Loads dropped DLL
PID:2060
-
-
C:\Users\Admin\AppData\Local\Temp\20A8.exeC:\Users\Admin\AppData\Local\Temp\20A8.exe1⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\48A4.exeC:\Users\Admin\AppData\Local\Temp\48A4.exe1⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\aafg31.exe"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"2⤵PID:4720
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵PID:3428
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵PID:4868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD59b1d9a3ce645a872a66dd45fc1e8bc46
SHA1a0268f9c1d3e66112e1ac9d857b7b12764a2901d
SHA2566ccd11a1236b38e19e975b070f64ed0ebbb8325e9367e93e863e8600e4e473bb
SHA5120d81a0d3de19bfae1a879f01383e7bfb89d97cbc1ae57e8cd0ad57fa0a614624ecaca07c549554ace8a5c8573ace1ddc9f3db7611825e2ceec3d5b1449d2cb40
-
Filesize
1.4MB
MD59b1d9a3ce645a872a66dd45fc1e8bc46
SHA1a0268f9c1d3e66112e1ac9d857b7b12764a2901d
SHA2566ccd11a1236b38e19e975b070f64ed0ebbb8325e9367e93e863e8600e4e473bb
SHA5120d81a0d3de19bfae1a879f01383e7bfb89d97cbc1ae57e8cd0ad57fa0a614624ecaca07c549554ace8a5c8573ace1ddc9f3db7611825e2ceec3d5b1449d2cb40
-
Filesize
222KB
MD5cb4ef46a3a78a5afb02a2de7249200ee
SHA1a3d9fa68f9dcfd4b7efbba7a117f7a6f520b930c
SHA256b663fcdcbba9366d129d32c6282ff26c55eaf456bccee93304bb831d713d6bf2
SHA51289268f91f3d72b1ba24353a8396498c3b2d3eca39fe53d566b4c2d93672086dc93f1664e70db8ca6ee029243e1b0e22f1cea8eb65623de8315d3e30ac3b62ab0
-
Filesize
222KB
MD5cb4ef46a3a78a5afb02a2de7249200ee
SHA1a3d9fa68f9dcfd4b7efbba7a117f7a6f520b930c
SHA256b663fcdcbba9366d129d32c6282ff26c55eaf456bccee93304bb831d713d6bf2
SHA51289268f91f3d72b1ba24353a8396498c3b2d3eca39fe53d566b4c2d93672086dc93f1664e70db8ca6ee029243e1b0e22f1cea8eb65623de8315d3e30ac3b62ab0
-
Filesize
4.1MB
MD5f654415fe64592f8492a16ee3dd73926
SHA192427b475e01762cd5004c73d520473cf32b514e
SHA25629e525538432ae06b78cdb97db0ecec94f9c538dc6565ddb6613bcf4f7e7b292
SHA512fc8797004522fc927673d4e8dfc4601e651fd9c944ac0beec81726363b7148f5e2f0a68647660388fee848f77804350acaa3108e4f972bc3e8532bc0c32f2cd1
-
Filesize
4.1MB
MD5f654415fe64592f8492a16ee3dd73926
SHA192427b475e01762cd5004c73d520473cf32b514e
SHA25629e525538432ae06b78cdb97db0ecec94f9c538dc6565ddb6613bcf4f7e7b292
SHA512fc8797004522fc927673d4e8dfc4601e651fd9c944ac0beec81726363b7148f5e2f0a68647660388fee848f77804350acaa3108e4f972bc3e8532bc0c32f2cd1
-
Filesize
4.1MB
MD5f654415fe64592f8492a16ee3dd73926
SHA192427b475e01762cd5004c73d520473cf32b514e
SHA25629e525538432ae06b78cdb97db0ecec94f9c538dc6565ddb6613bcf4f7e7b292
SHA512fc8797004522fc927673d4e8dfc4601e651fd9c944ac0beec81726363b7148f5e2f0a68647660388fee848f77804350acaa3108e4f972bc3e8532bc0c32f2cd1
-
Filesize
4.6MB
MD5f22632a300878ae7ab5bc865e8b4b804
SHA1572a142b5ef1533555dfe31ee88d86b38a3235fb
SHA256ace208a4aebe9ac1b659808b108c795961d1160de5b147be47b5624f6de46830
SHA5126f7dfb4d746f91743f2ba40b9d0eaefe3fa7d16748206cbce502e137b844044456d69335d69c0e1057a9920eb71308435be24b87fa7df4912c3ebe1168550aa5
-
Filesize
4.6MB
MD5f22632a300878ae7ab5bc865e8b4b804
SHA1572a142b5ef1533555dfe31ee88d86b38a3235fb
SHA256ace208a4aebe9ac1b659808b108c795961d1160de5b147be47b5624f6de46830
SHA5126f7dfb4d746f91743f2ba40b9d0eaefe3fa7d16748206cbce502e137b844044456d69335d69c0e1057a9920eb71308435be24b87fa7df4912c3ebe1168550aa5
-
Filesize
706KB
MD5d5a6096de9c752b863b3dca30f7e45bb
SHA1ce44a164d2d9c53db84be578fe16f1a3502feb98
SHA256d2a942146832748b6d83c11ea4a791e4b3b5ecfc21a5d4a48453b6595d1ee795
SHA5122ac5a5f22faf3c31b22582c715eaea55bff7d416c70c60b926f813989d59838bfec4cb3636f13fab5859e4c7c120847311338cb191fc617dc47e175edffc4dbc
-
Filesize
706KB
MD5d5a6096de9c752b863b3dca30f7e45bb
SHA1ce44a164d2d9c53db84be578fe16f1a3502feb98
SHA256d2a942146832748b6d83c11ea4a791e4b3b5ecfc21a5d4a48453b6595d1ee795
SHA5122ac5a5f22faf3c31b22582c715eaea55bff7d416c70c60b926f813989d59838bfec4cb3636f13fab5859e4c7c120847311338cb191fc617dc47e175edffc4dbc
-
Filesize
249KB
MD53f63565f2340a7378449971906111843
SHA101bc7e7e6f7d0414ccfda087213f137862052363
SHA25660268b3bb9ddc3353219eef23bce63f73bf2b4e398a1357d15c93ad63c21289a
SHA5129bb94b205a219e3b82c2f163d73abddda4e20c0bd0b247bc8558b7d8b7eb597e08e0f881902b1850a7bf06b448285984dd96873ae024ee4ce9adc2f9f633c7a2
-
Filesize
249KB
MD53f63565f2340a7378449971906111843
SHA101bc7e7e6f7d0414ccfda087213f137862052363
SHA25660268b3bb9ddc3353219eef23bce63f73bf2b4e398a1357d15c93ad63c21289a
SHA5129bb94b205a219e3b82c2f163d73abddda4e20c0bd0b247bc8558b7d8b7eb597e08e0f881902b1850a7bf06b448285984dd96873ae024ee4ce9adc2f9f633c7a2
-
Filesize
261KB
MD5aaa35a5dd28fb6dcd151ccb0b9ed270d
SHA108a9dbe8c26691836f34eab89f1c500085b6efc5
SHA256902b165bc7d6facfcda550144157b58d122d3c38abe5f5cfe630ad5eea8f8557
SHA512155c3c6554268664afa1144fed18551de9f1787b787693f0d41697b4819b8f635eff6b82eafd690e19c351fe4e6349f34f9a74e45cf86ddc074a085aaf4fabed
-
Filesize
261KB
MD5aaa35a5dd28fb6dcd151ccb0b9ed270d
SHA108a9dbe8c26691836f34eab89f1c500085b6efc5
SHA256902b165bc7d6facfcda550144157b58d122d3c38abe5f5cfe630ad5eea8f8557
SHA512155c3c6554268664afa1144fed18551de9f1787b787693f0d41697b4819b8f635eff6b82eafd690e19c351fe4e6349f34f9a74e45cf86ddc074a085aaf4fabed
-
Filesize
399KB
MD57f6e5e08d9fb67128f7fccc77e294011
SHA1ba918aa4180417de13f9fba10eef72b87bf8c21f
SHA25637333c4e8cab40f04954ed9dcd231f8eeea9eadc6d86e4f90aed014f21ac2528
SHA5124164b2bfc311b09e588f9d6ec58e31a39e1e4eb0c9337e25951ec70844ae15d8da8d8c76801cfef82eccd4074831f71b6cdef22a2658236e1618b726a1895afc
-
Filesize
399KB
MD57f6e5e08d9fb67128f7fccc77e294011
SHA1ba918aa4180417de13f9fba10eef72b87bf8c21f
SHA25637333c4e8cab40f04954ed9dcd231f8eeea9eadc6d86e4f90aed014f21ac2528
SHA5124164b2bfc311b09e588f9d6ec58e31a39e1e4eb0c9337e25951ec70844ae15d8da8d8c76801cfef82eccd4074831f71b6cdef22a2658236e1618b726a1895afc
-
Filesize
714KB
MD5ef6b6fbf4169dfef91fd2651b7fd2b4f
SHA1564dcbad847b304c784a72aa871bea983dab1d53
SHA256e79f44142bc6a631b5cf8e72b627020278f886686ac17508e4342ef38262d7e5
SHA512263e52280d9c69eade7704cadc17f990bc0b3d6d991193f37e732e55f4eb86393efc82af2b146f990289c039e0317cf381fb1e135bd3e53d1f3bd6d9d40670fc
-
Filesize
714KB
MD5ef6b6fbf4169dfef91fd2651b7fd2b4f
SHA1564dcbad847b304c784a72aa871bea983dab1d53
SHA256e79f44142bc6a631b5cf8e72b627020278f886686ac17508e4342ef38262d7e5
SHA512263e52280d9c69eade7704cadc17f990bc0b3d6d991193f37e732e55f4eb86393efc82af2b146f990289c039e0317cf381fb1e135bd3e53d1f3bd6d9d40670fc
-
Filesize
298KB
MD54d36c3880e96044315eac23e193da49a
SHA1690a95f9f8ac355b293455ebd781ac7eec6e64bc
SHA2568d698b8f19561e7c1389b912ca81c86e4062de51ce58bf3b379dc35718ffd3b7
SHA51241d48a11a73fbcd360a0bcf68bdd847d64682ef2660bd5122ebc8b64fe8a69b7b2e6428f74a05f2f21841b036376ebaecd871be64baa104d51d38fb0a2571544
-
Filesize
298KB
MD54d36c3880e96044315eac23e193da49a
SHA1690a95f9f8ac355b293455ebd781ac7eec6e64bc
SHA2568d698b8f19561e7c1389b912ca81c86e4062de51ce58bf3b379dc35718ffd3b7
SHA51241d48a11a73fbcd360a0bcf68bdd847d64682ef2660bd5122ebc8b64fe8a69b7b2e6428f74a05f2f21841b036376ebaecd871be64baa104d51d38fb0a2571544
-
Filesize
298KB
MD54d36c3880e96044315eac23e193da49a
SHA1690a95f9f8ac355b293455ebd781ac7eec6e64bc
SHA2568d698b8f19561e7c1389b912ca81c86e4062de51ce58bf3b379dc35718ffd3b7
SHA51241d48a11a73fbcd360a0bcf68bdd847d64682ef2660bd5122ebc8b64fe8a69b7b2e6428f74a05f2f21841b036376ebaecd871be64baa104d51d38fb0a2571544
-
Filesize
215KB
MD5aeaba9864af82dba52386aa480b035db
SHA139525b8cbe1eb7888bcc8a7c89178e2a331ca8d1
SHA25629bec00a5349dd65a067a12bf5f746300332d2556692995bf8ac0f5d247101e0
SHA512d741fde2b23975d75314a76a30294854cbc24f0367a2cde28632dca4a13bf6d9b3a0a4625ceb30b5d54cb96cea079823fc0b03045cbd88e3b544943e6d5f5626
-
Filesize
215KB
MD5aeaba9864af82dba52386aa480b035db
SHA139525b8cbe1eb7888bcc8a7c89178e2a331ca8d1
SHA25629bec00a5349dd65a067a12bf5f746300332d2556692995bf8ac0f5d247101e0
SHA512d741fde2b23975d75314a76a30294854cbc24f0367a2cde28632dca4a13bf6d9b3a0a4625ceb30b5d54cb96cea079823fc0b03045cbd88e3b544943e6d5f5626
-
Filesize
215KB
MD5aeaba9864af82dba52386aa480b035db
SHA139525b8cbe1eb7888bcc8a7c89178e2a331ca8d1
SHA25629bec00a5349dd65a067a12bf5f746300332d2556692995bf8ac0f5d247101e0
SHA512d741fde2b23975d75314a76a30294854cbc24f0367a2cde28632dca4a13bf6d9b3a0a4625ceb30b5d54cb96cea079823fc0b03045cbd88e3b544943e6d5f5626