Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 13:28
Static task
static1
Behavioral task
behavioral1
Sample
72787c0133ebe280a7d16f6db8000bcd.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
72787c0133ebe280a7d16f6db8000bcd.exe
Resource
win10v2004-20231222-en
General
-
Target
72787c0133ebe280a7d16f6db8000bcd.exe
-
Size
326KB
-
MD5
72787c0133ebe280a7d16f6db8000bcd
-
SHA1
b287f8d7f22ded27444ae999e65a599cca8cc60a
-
SHA256
01e062f17f17f54100c3d6849477017acdd7bd57f751a7eb18484c77474d5a6a
-
SHA512
8e2fd5d50d0f4579a5b7721d5c1fdc6bef1582822a723f293cf0b982eee588bf9d933499c5c16941474a4e3928c42d2305984652aa9542ac31ebcea4dcd9c596
-
SSDEEP
6144:FXURnqgV/GvULWy9BtdNVJjq3MGMXmSUexV:FonTTWy9BFVJLmUx
Malware Config
Extracted
smokeloader
0002
Extracted
smokeloader
2020
https://cinems.club/search.php
https://clothes.surf/search.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3404 Process not Found -
Executes dropped EXE 1 IoCs
pid Process 4796 riwtrge -
Loads dropped DLL 2 IoCs
pid Process 1224 72787c0133ebe280a7d16f6db8000bcd.exe 4796 riwtrge -
Program crash 2 IoCs
pid pid_target Process procid_target 4596 1224 WerFault.exe 63 4196 4796 WerFault.exe 94 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 72787c0133ebe280a7d16f6db8000bcd.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 72787c0133ebe280a7d16f6db8000bcd.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 72787c0133ebe280a7d16f6db8000bcd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI riwtrge Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI riwtrge Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI riwtrge -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1224 72787c0133ebe280a7d16f6db8000bcd.exe 1224 72787c0133ebe280a7d16f6db8000bcd.exe 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found 3404 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1224 72787c0133ebe280a7d16f6db8000bcd.exe 4796 riwtrge -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3404 Process not Found Token: SeCreatePagefilePrivilege 3404 Process not Found Token: SeShutdownPrivilege 3404 Process not Found Token: SeCreatePagefilePrivilege 3404 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3404 Process not Found -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\72787c0133ebe280a7d16f6db8000bcd.exe"C:\Users\Admin\AppData\Local\Temp\72787c0133ebe280a7d16f6db8000bcd.exe"1⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 3802⤵
- Program crash
PID:4596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1224 -ip 12241⤵PID:3040
-
C:\Users\Admin\AppData\Roaming\riwtrgeC:\Users\Admin\AppData\Roaming\riwtrge1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 3762⤵
- Program crash
PID:4196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4796 -ip 47961⤵PID:1792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
326KB
MD572787c0133ebe280a7d16f6db8000bcd
SHA1b287f8d7f22ded27444ae999e65a599cca8cc60a
SHA25601e062f17f17f54100c3d6849477017acdd7bd57f751a7eb18484c77474d5a6a
SHA5128e2fd5d50d0f4579a5b7721d5c1fdc6bef1582822a723f293cf0b982eee588bf9d933499c5c16941474a4e3928c42d2305984652aa9542ac31ebcea4dcd9c596