Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 06:02
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
294KB
-
MD5
0ad8d40baae0644d4e3d994c5a8405ac
-
SHA1
ce9da8f3d3a618571e7c51e0dc42133e26ded313
-
SHA256
bd1a7304c5cc386fb5b1291dc81a28c2fd6d9c6189fab48fffd31e1ddd18ddd1
-
SHA512
e86d07ef2812cf26f2daf6b67dcff19ab05e516bddf2305507e94ca441af55e5e836e68d45602e33354c3fae88a27299f7f6a250c36fbec0d8e1f3fe4079b966
-
SSDEEP
3072:peJCXZpXSivGjYTBxSrTRKTABujHdYoJWxg1NsyfkAhhigM+kiMg87dB:OCZtSdSxWTAJ0xgI8kShigUg8Z
Malware Config
Extracted
Protocol: ftp- Host:
195.85.115.195 - Port:
21 - Username:
TEST3 - Password:
159753
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://gudintas.at/tmp/
http://pik96.ru/tmp/
http://rosatiauto.com/tmp/
http://kingpirate.ru/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4196 37D4.exe -
Loads dropped DLL 2 IoCs
pid Process 4196 37D4.exe 4196 37D4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x00070000000231e4-17.dat nsis_installer_1 behavioral2/files/0x00070000000231e4-17.dat nsis_installer_2 behavioral2/files/0x00070000000231e4-18.dat nsis_installer_1 behavioral2/files/0x00070000000231e4-18.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 504 file.exe 504 file.exe 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found 3200 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3200 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 504 file.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3200 Process not Found Token: SeCreatePagefilePrivilege 3200 Process not Found Token: SeShutdownPrivilege 3200 Process not Found Token: SeCreatePagefilePrivilege 3200 Process not Found Token: SeShutdownPrivilege 3200 Process not Found Token: SeCreatePagefilePrivilege 3200 Process not Found Token: SeShutdownPrivilege 3200 Process not Found Token: SeCreatePagefilePrivilege 3200 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3200 Process not Found -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3200 wrote to memory of 4196 3200 Process not Found 97 PID 3200 wrote to memory of 4196 3200 Process not Found 97 PID 3200 wrote to memory of 4196 3200 Process not Found 97 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:504
-
C:\Users\Admin\AppData\Local\Temp\37D4.exeC:\Users\Admin\AppData\Local\Temp\37D4.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129KB
MD56d57be58312131cb7672f3d72bf1b5a1
SHA13dec741a0e5b7271416ad09dbd35be896f07c939
SHA256e000e93034aa809e36c2c270db09f90d9f68949645c3c6d3c7922ebec2b01f13
SHA5126cb7236d81543a32baab42f60cd77c17eafdab11c014520e01a699f85ac74995466f9c3020ba449a4422cb9275665799b57a8b1d40d73aedaf3ef42045b307ce
-
Filesize
129KB
MD56d57be58312131cb7672f3d72bf1b5a1
SHA13dec741a0e5b7271416ad09dbd35be896f07c939
SHA256e000e93034aa809e36c2c270db09f90d9f68949645c3c6d3c7922ebec2b01f13
SHA5126cb7236d81543a32baab42f60cd77c17eafdab11c014520e01a699f85ac74995466f9c3020ba449a4422cb9275665799b57a8b1d40d73aedaf3ef42045b307ce
-
Filesize
18KB
MD5994669c5737b25c26642c94180e92fa2
SHA1d8a1836914a446b0e06881ce1be8631554adafde
SHA256bf01a1f272e0daf82df3407690b646e0ff6b2c562e36e47cf177eda71ccb6f6c
SHA512d0ab7ca7f890ef9e59015c33e6b400a0a4d1ce0d24599537e09e845f4b953e3ecd44bf3e3cbe584f57c2948743e689ed67d2d40e6caf923bd630886e89c38563
-
Filesize
163KB
MD52dc35ddcabcb2b24919b9afae4ec3091
SHA19eeed33c3abc656353a7ebd1c66af38cccadd939
SHA2566bbeb39747f1526752980d4dbec2fe2c7347f3cc983a79c92561b92fe472e7a1
SHA5120ccac336924f684da1f73db2dd230a0c932c5b4115ae1fa0e708b9db5e39d2a07dc54dac8d95881a42069cbb2c2886e880cdad715deda83c0de38757a0f6a901
-
Filesize
39B
MD5f8259102dfc36d919a899cdb8fde48ce
SHA14510c766809835dab814c25c2223009eb33e633a
SHA25652069aeefb58dad898781d8bde183ffda18faae11f17ace8ce83368cab863fb1
SHA512a77c8a67c95d49e353f903e3bd394e343c0dfa633dcffbfd7c1b34d5e1bdfb9a372ece71360812e44c5c5badfa0fc81387a6f65f96616d6307083c2b3bb0213f