Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07/10/2023, 06:09
Static task
static1
Behavioral task
behavioral1
Sample
3ae385541e4b73e89a72f72cac99bcedcc8770c2877d19809abad5d3d72fa1d8.exe
Resource
win10v2004-20230915-en
General
-
Target
3ae385541e4b73e89a72f72cac99bcedcc8770c2877d19809abad5d3d72fa1d8.exe
-
Size
274KB
-
MD5
6060cc7853c91eeba98443063819fa4d
-
SHA1
644cceb80ca69b92e4cbe60e056208ac22a9555b
-
SHA256
3ae385541e4b73e89a72f72cac99bcedcc8770c2877d19809abad5d3d72fa1d8
-
SHA512
c5a7d6f67b64ec4245d8b515c19f2d8df760452ca4e2adde8b88b02d855c0cea51c849930dfdd3adf784f5e7fc280329a4c91cbde467c12b15a7e477dae4be9e
-
SSDEEP
3072:26Qz39ZtaQPYolOoniTSqXQMIknelXphWgFVo22:2hBZYQPYDXQmnelP/FO2
Malware Config
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3980 set thread context of 4408 3980 3ae385541e4b73e89a72f72cac99bcedcc8770c2877d19809abad5d3d72fa1d8.exe 86 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3ae385541e4b73e89a72f72cac99bcedcc8770c2877d19809abad5d3d72fa1d8.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3ae385541e4b73e89a72f72cac99bcedcc8770c2877d19809abad5d3d72fa1d8.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3ae385541e4b73e89a72f72cac99bcedcc8770c2877d19809abad5d3d72fa1d8.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4408 3ae385541e4b73e89a72f72cac99bcedcc8770c2877d19809abad5d3d72fa1d8.exe 4408 3ae385541e4b73e89a72f72cac99bcedcc8770c2877d19809abad5d3d72fa1d8.exe 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3176 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4408 3ae385541e4b73e89a72f72cac99bcedcc8770c2877d19809abad5d3d72fa1d8.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3176 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3980 wrote to memory of 4408 3980 3ae385541e4b73e89a72f72cac99bcedcc8770c2877d19809abad5d3d72fa1d8.exe 86 PID 3980 wrote to memory of 4408 3980 3ae385541e4b73e89a72f72cac99bcedcc8770c2877d19809abad5d3d72fa1d8.exe 86 PID 3980 wrote to memory of 4408 3980 3ae385541e4b73e89a72f72cac99bcedcc8770c2877d19809abad5d3d72fa1d8.exe 86 PID 3980 wrote to memory of 4408 3980 3ae385541e4b73e89a72f72cac99bcedcc8770c2877d19809abad5d3d72fa1d8.exe 86 PID 3980 wrote to memory of 4408 3980 3ae385541e4b73e89a72f72cac99bcedcc8770c2877d19809abad5d3d72fa1d8.exe 86 PID 3980 wrote to memory of 4408 3980 3ae385541e4b73e89a72f72cac99bcedcc8770c2877d19809abad5d3d72fa1d8.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ae385541e4b73e89a72f72cac99bcedcc8770c2877d19809abad5d3d72fa1d8.exe"C:\Users\Admin\AppData\Local\Temp\3ae385541e4b73e89a72f72cac99bcedcc8770c2877d19809abad5d3d72fa1d8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\3ae385541e4b73e89a72f72cac99bcedcc8770c2877d19809abad5d3d72fa1d8.exe"C:\Users\Admin\AppData\Local\Temp\3ae385541e4b73e89a72f72cac99bcedcc8770c2877d19809abad5d3d72fa1d8.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4408
-