Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 14:05
Static task
static1
Behavioral task
behavioral1
Sample
2487cd5fa775dc518846a80cfecbfd6f0b28d34aec519ba9cc4ea4b8ce6c0b8f.exe
Resource
win10v2004-20231023-en
General
-
Target
2487cd5fa775dc518846a80cfecbfd6f0b28d34aec519ba9cc4ea4b8ce6c0b8f.exe
-
Size
238KB
-
MD5
b4fa6b59e75b821ac65445c55d6d9a58
-
SHA1
34a8a430e97aca4aa91c16c6a2637839706c7e9a
-
SHA256
2487cd5fa775dc518846a80cfecbfd6f0b28d34aec519ba9cc4ea4b8ce6c0b8f
-
SHA512
8430e1f5baa98cc7fa45ae363eabbd6336b60020e2b9526040f08b3df176c3c03d8f66e523db839f8855d312b043a378c16c804e87bb47f2b4bc6668fb7adf86
-
SSDEEP
3072:f6o6eVb6xOxVkGdc37RXMpGefSOmeoS45IwmAgHLd7:CoDb6xCkGe37WpGeqOWlewLU
Malware Config
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3308 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4152 set thread context of 856 4152 2487cd5fa775dc518846a80cfecbfd6f0b28d34aec519ba9cc4ea4b8ce6c0b8f.exe 89 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2487cd5fa775dc518846a80cfecbfd6f0b28d34aec519ba9cc4ea4b8ce6c0b8f.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2487cd5fa775dc518846a80cfecbfd6f0b28d34aec519ba9cc4ea4b8ce6c0b8f.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2487cd5fa775dc518846a80cfecbfd6f0b28d34aec519ba9cc4ea4b8ce6c0b8f.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 856 2487cd5fa775dc518846a80cfecbfd6f0b28d34aec519ba9cc4ea4b8ce6c0b8f.exe 856 2487cd5fa775dc518846a80cfecbfd6f0b28d34aec519ba9cc4ea4b8ce6c0b8f.exe 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3308 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 856 2487cd5fa775dc518846a80cfecbfd6f0b28d34aec519ba9cc4ea4b8ce6c0b8f.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeManageVolumePrivilege 3472 svchost.exe Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found Token: SeCreatePagefilePrivilege 3308 Process not Found Token: SeShutdownPrivilege 3308 Process not Found -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3308 Process not Found 3308 Process not Found 3308 Process not Found 3308 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4152 wrote to memory of 856 4152 2487cd5fa775dc518846a80cfecbfd6f0b28d34aec519ba9cc4ea4b8ce6c0b8f.exe 89 PID 4152 wrote to memory of 856 4152 2487cd5fa775dc518846a80cfecbfd6f0b28d34aec519ba9cc4ea4b8ce6c0b8f.exe 89 PID 4152 wrote to memory of 856 4152 2487cd5fa775dc518846a80cfecbfd6f0b28d34aec519ba9cc4ea4b8ce6c0b8f.exe 89 PID 4152 wrote to memory of 856 4152 2487cd5fa775dc518846a80cfecbfd6f0b28d34aec519ba9cc4ea4b8ce6c0b8f.exe 89 PID 4152 wrote to memory of 856 4152 2487cd5fa775dc518846a80cfecbfd6f0b28d34aec519ba9cc4ea4b8ce6c0b8f.exe 89 PID 4152 wrote to memory of 856 4152 2487cd5fa775dc518846a80cfecbfd6f0b28d34aec519ba9cc4ea4b8ce6c0b8f.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2487cd5fa775dc518846a80cfecbfd6f0b28d34aec519ba9cc4ea4b8ce6c0b8f.exe"C:\Users\Admin\AppData\Local\Temp\2487cd5fa775dc518846a80cfecbfd6f0b28d34aec519ba9cc4ea4b8ce6c0b8f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\2487cd5fa775dc518846a80cfecbfd6f0b28d34aec519ba9cc4ea4b8ce6c0b8f.exe"C:\Users\Admin\AppData\Local\Temp\2487cd5fa775dc518846a80cfecbfd6f0b28d34aec519ba9cc4ea4b8ce6c0b8f.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:856
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4108
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3472