Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
02/11/2023, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
51690da60d1c2bfe20e0e865240193bc3d9e2dbc3e5727de8891976b01b83fa0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
51690da60d1c2bfe20e0e865240193bc3d9e2dbc3e5727de8891976b01b83fa0.exe
Resource
win10v2004-20231025-en
General
-
Target
51690da60d1c2bfe20e0e865240193bc3d9e2dbc3e5727de8891976b01b83fa0.exe
-
Size
206KB
-
MD5
f9969ef3805249fe3fd6f6ffdb0723b8
-
SHA1
bb3c689bc0837515cb82739d0efb92441f7c31d7
-
SHA256
51690da60d1c2bfe20e0e865240193bc3d9e2dbc3e5727de8891976b01b83fa0
-
SHA512
ffe3b8786baf1fd5de2b473871c12c44e4f2a8ea2859d556d674325f6e67b950aba7acae762d5efcab9d02bd89912ab4f66eea906335a76f47abca8d5f3cc91c
-
SSDEEP
3072:oBTRRddkirFSMB6V8JURZFY0hj34h/wDtfDpmwA9AFnJNUc:WRRddDrFSMUeJURnv4O7O9
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://dpav.cc/tmp/
http://lrproduct.ru/tmp/
http://kggcp.com/tmp/
http://talesofpirates.net/tmp/
http://pirateking.online/tmp/
http://piratia.pw/tmp/
http://go-piratia.ru/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1232 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 51690da60d1c2bfe20e0e865240193bc3d9e2dbc3e5727de8891976b01b83fa0.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 51690da60d1c2bfe20e0e865240193bc3d9e2dbc3e5727de8891976b01b83fa0.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 51690da60d1c2bfe20e0e865240193bc3d9e2dbc3e5727de8891976b01b83fa0.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1244 51690da60d1c2bfe20e0e865240193bc3d9e2dbc3e5727de8891976b01b83fa0.exe 1244 51690da60d1c2bfe20e0e865240193bc3d9e2dbc3e5727de8891976b01b83fa0.exe 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1232 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1244 51690da60d1c2bfe20e0e865240193bc3d9e2dbc3e5727de8891976b01b83fa0.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1232 Process not Found 1232 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1232 Process not Found 1232 Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\51690da60d1c2bfe20e0e865240193bc3d9e2dbc3e5727de8891976b01b83fa0.exe"C:\Users\Admin\AppData\Local\Temp\51690da60d1c2bfe20e0e865240193bc3d9e2dbc3e5727de8891976b01b83fa0.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1244