Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 03:23
Static task
static1
Behavioral task
behavioral1
Sample
17779ddb4bc3962bda0b0461ddf3eaf665c54364b3abe98d209b6f40781a1ab9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
17779ddb4bc3962bda0b0461ddf3eaf665c54364b3abe98d209b6f40781a1ab9.exe
Resource
win10v2004-20230915-en
General
-
Target
17779ddb4bc3962bda0b0461ddf3eaf665c54364b3abe98d209b6f40781a1ab9.exe
-
Size
301KB
-
MD5
f5e6eae839c0b6c9d7f1c6141c01cc74
-
SHA1
8845fb5cc5d173f768555f69d8fa97eae0b9dc38
-
SHA256
17779ddb4bc3962bda0b0461ddf3eaf665c54364b3abe98d209b6f40781a1ab9
-
SHA512
28b797f3224540473e868f869129dffe8470eb57706a707df861091730fb849c0039223531ff4c975a94534b895c2bbe91621d726b73884c8a508412c1198e48
-
SSDEEP
6144:SG6/2ie+G2auN4yyYd5Gypbn2UHFV+FKj:StG+tae4JYd5hnn
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://gudintas.at/tmp/
http://pik96.ru/tmp/
http://rosatiauto.com/tmp/
http://kingpirate.ru/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1276 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 17779ddb4bc3962bda0b0461ddf3eaf665c54364b3abe98d209b6f40781a1ab9.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 17779ddb4bc3962bda0b0461ddf3eaf665c54364b3abe98d209b6f40781a1ab9.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 17779ddb4bc3962bda0b0461ddf3eaf665c54364b3abe98d209b6f40781a1ab9.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2088 17779ddb4bc3962bda0b0461ddf3eaf665c54364b3abe98d209b6f40781a1ab9.exe 2088 17779ddb4bc3962bda0b0461ddf3eaf665c54364b3abe98d209b6f40781a1ab9.exe 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1276 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2088 17779ddb4bc3962bda0b0461ddf3eaf665c54364b3abe98d209b6f40781a1ab9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17779ddb4bc3962bda0b0461ddf3eaf665c54364b3abe98d209b6f40781a1ab9.exe"C:\Users\Admin\AppData\Local\Temp\17779ddb4bc3962bda0b0461ddf3eaf665c54364b3abe98d209b6f40781a1ab9.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2088