Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
07/10/2023, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
a8271bde9b3cc677a4bc50a97deef7b9ce06d14b6a66ec6a8ee45e02e85db0a6.exe
Resource
win10-20230915-en
General
-
Target
a8271bde9b3cc677a4bc50a97deef7b9ce06d14b6a66ec6a8ee45e02e85db0a6.exe
-
Size
284KB
-
MD5
f8fc1a1c58436919bc933c0ff8371491
-
SHA1
a8a3248892ea6ac1fa505be1e45c8816ae20c9ee
-
SHA256
a8271bde9b3cc677a4bc50a97deef7b9ce06d14b6a66ec6a8ee45e02e85db0a6
-
SHA512
1731602c68991a3567d09981ed2d4fbffec1579fc4d83e09c70cd81a242c911459b57e049647572b85cc44646ddf15241e67a83d8f495c5bbf7a2087d415c017
-
SSDEEP
3072:56ZT9ZIaPPpwlKn/4LVkjPNOi5VXOnEUsodREZmow:0TZ3PPpwl606T4iPXOnHfd4m
Malware Config
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3280 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 2824 rhbussr 4756 rhbussr -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4852 set thread context of 3084 4852 a8271bde9b3cc677a4bc50a97deef7b9ce06d14b6a66ec6a8ee45e02e85db0a6.exe 70 PID 2824 set thread context of 4756 2824 rhbussr 72 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rhbussr Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rhbussr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a8271bde9b3cc677a4bc50a97deef7b9ce06d14b6a66ec6a8ee45e02e85db0a6.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a8271bde9b3cc677a4bc50a97deef7b9ce06d14b6a66ec6a8ee45e02e85db0a6.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a8271bde9b3cc677a4bc50a97deef7b9ce06d14b6a66ec6a8ee45e02e85db0a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rhbussr -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3084 a8271bde9b3cc677a4bc50a97deef7b9ce06d14b6a66ec6a8ee45e02e85db0a6.exe 3084 a8271bde9b3cc677a4bc50a97deef7b9ce06d14b6a66ec6a8ee45e02e85db0a6.exe 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3280 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3084 a8271bde9b3cc677a4bc50a97deef7b9ce06d14b6a66ec6a8ee45e02e85db0a6.exe 4756 rhbussr -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3280 Process not Found Token: SeCreatePagefilePrivilege 3280 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4852 wrote to memory of 3084 4852 a8271bde9b3cc677a4bc50a97deef7b9ce06d14b6a66ec6a8ee45e02e85db0a6.exe 70 PID 4852 wrote to memory of 3084 4852 a8271bde9b3cc677a4bc50a97deef7b9ce06d14b6a66ec6a8ee45e02e85db0a6.exe 70 PID 4852 wrote to memory of 3084 4852 a8271bde9b3cc677a4bc50a97deef7b9ce06d14b6a66ec6a8ee45e02e85db0a6.exe 70 PID 4852 wrote to memory of 3084 4852 a8271bde9b3cc677a4bc50a97deef7b9ce06d14b6a66ec6a8ee45e02e85db0a6.exe 70 PID 4852 wrote to memory of 3084 4852 a8271bde9b3cc677a4bc50a97deef7b9ce06d14b6a66ec6a8ee45e02e85db0a6.exe 70 PID 4852 wrote to memory of 3084 4852 a8271bde9b3cc677a4bc50a97deef7b9ce06d14b6a66ec6a8ee45e02e85db0a6.exe 70 PID 2824 wrote to memory of 4756 2824 rhbussr 72 PID 2824 wrote to memory of 4756 2824 rhbussr 72 PID 2824 wrote to memory of 4756 2824 rhbussr 72 PID 2824 wrote to memory of 4756 2824 rhbussr 72 PID 2824 wrote to memory of 4756 2824 rhbussr 72 PID 2824 wrote to memory of 4756 2824 rhbussr 72 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8271bde9b3cc677a4bc50a97deef7b9ce06d14b6a66ec6a8ee45e02e85db0a6.exe"C:\Users\Admin\AppData\Local\Temp\a8271bde9b3cc677a4bc50a97deef7b9ce06d14b6a66ec6a8ee45e02e85db0a6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\a8271bde9b3cc677a4bc50a97deef7b9ce06d14b6a66ec6a8ee45e02e85db0a6.exe"C:\Users\Admin\AppData\Local\Temp\a8271bde9b3cc677a4bc50a97deef7b9ce06d14b6a66ec6a8ee45e02e85db0a6.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3084
-
-
C:\Users\Admin\AppData\Roaming\rhbussrC:\Users\Admin\AppData\Roaming\rhbussr1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Roaming\rhbussrC:\Users\Admin\AppData\Roaming\rhbussr2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD5f8fc1a1c58436919bc933c0ff8371491
SHA1a8a3248892ea6ac1fa505be1e45c8816ae20c9ee
SHA256a8271bde9b3cc677a4bc50a97deef7b9ce06d14b6a66ec6a8ee45e02e85db0a6
SHA5121731602c68991a3567d09981ed2d4fbffec1579fc4d83e09c70cd81a242c911459b57e049647572b85cc44646ddf15241e67a83d8f495c5bbf7a2087d415c017
-
Filesize
284KB
MD5f8fc1a1c58436919bc933c0ff8371491
SHA1a8a3248892ea6ac1fa505be1e45c8816ae20c9ee
SHA256a8271bde9b3cc677a4bc50a97deef7b9ce06d14b6a66ec6a8ee45e02e85db0a6
SHA5121731602c68991a3567d09981ed2d4fbffec1579fc4d83e09c70cd81a242c911459b57e049647572b85cc44646ddf15241e67a83d8f495c5bbf7a2087d415c017
-
Filesize
284KB
MD5f8fc1a1c58436919bc933c0ff8371491
SHA1a8a3248892ea6ac1fa505be1e45c8816ae20c9ee
SHA256a8271bde9b3cc677a4bc50a97deef7b9ce06d14b6a66ec6a8ee45e02e85db0a6
SHA5121731602c68991a3567d09981ed2d4fbffec1579fc4d83e09c70cd81a242c911459b57e049647572b85cc44646ddf15241e67a83d8f495c5bbf7a2087d415c017