Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2023, 07:09
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231020-en
General
-
Target
file.exe
-
Size
251KB
-
MD5
bedac42746c2b83bf0b4238c72271346
-
SHA1
cc2ed883609ffafcaa77eb4738d1b7fbdf0a0ffa
-
SHA256
5628951705135b7582a7913c52cc3c547b50a6a9badc656351b8b7945b1d8d38
-
SHA512
cb08cc09b1ecd5a8c226b566f404c80d2aa2c758747e0010681dd8798a5d5e3411290d2d14182871a66f3b3aa114369f6443b8e6d5819a06061c01c0b29d60c1
-
SSDEEP
3072:HKtk4b3BOGMPMbKRzsraTsFg6KdmxaNDllCVlINC5Ru557qAo:qOKROGMPMbKurPomWhMrLChV
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://dpav.cc/tmp/
http://lrproduct.ru/tmp/
http://kggcp.com/tmp/
http://talesofpirates.net/tmp/
http://pirateking.online/tmp/
http://piratia.pw/tmp/
http://go-piratia.ru/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3344 Process not Found -
Executes dropped EXE 1 IoCs
pid Process 2344 drfsrih -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI drfsrih Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI drfsrih Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI drfsrih -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4792 file.exe 4792 file.exe 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found 3344 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3344 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4792 file.exe 2344 drfsrih -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3344 Process not Found -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4792
-
C:\Users\Admin\AppData\Roaming\drfsrihC:\Users\Admin\AppData\Roaming\drfsrih1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5bedac42746c2b83bf0b4238c72271346
SHA1cc2ed883609ffafcaa77eb4738d1b7fbdf0a0ffa
SHA2565628951705135b7582a7913c52cc3c547b50a6a9badc656351b8b7945b1d8d38
SHA512cb08cc09b1ecd5a8c226b566f404c80d2aa2c758747e0010681dd8798a5d5e3411290d2d14182871a66f3b3aa114369f6443b8e6d5819a06061c01c0b29d60c1
-
Filesize
251KB
MD5bedac42746c2b83bf0b4238c72271346
SHA1cc2ed883609ffafcaa77eb4738d1b7fbdf0a0ffa
SHA2565628951705135b7582a7913c52cc3c547b50a6a9badc656351b8b7945b1d8d38
SHA512cb08cc09b1ecd5a8c226b566f404c80d2aa2c758747e0010681dd8798a5d5e3411290d2d14182871a66f3b3aa114369f6443b8e6d5819a06061c01c0b29d60c1