Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
241s -
max time network
200s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 06:04
Static task
static1
Behavioral task
behavioral1
Sample
2b18e848913549f52ef1b3c99411ef5c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2b18e848913549f52ef1b3c99411ef5c.exe
Resource
win10v2004-20231222-en
General
-
Target
2b18e848913549f52ef1b3c99411ef5c.exe
-
Size
177KB
-
MD5
2b18e848913549f52ef1b3c99411ef5c
-
SHA1
deeae31755acdf4dac3c9badd383d0602eb7449f
-
SHA256
faf49f9b1d785e077bd17c37eddec80c57d3ffc843a745e6854c9b7a6812b7e0
-
SHA512
ec5550bedc4ce1daa1ea1c9bdd9c2d9a762db86a27ed79db0e82abd60fed4a8b8390d94ef683e6b4380e9967b91b867c863bd18bdeec355c6f059fcda6957592
-
SSDEEP
3072:D6abkbeQNnL8RkJ+W5wSRFHHwhZoWC9sI5/DuT61m:D6TblNnLmLUHwhZU9sI5/
Malware Config
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1216 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2952 set thread context of 2600 2952 2b18e848913549f52ef1b3c99411ef5c.exe 27 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2b18e848913549f52ef1b3c99411ef5c.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2b18e848913549f52ef1b3c99411ef5c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2b18e848913549f52ef1b3c99411ef5c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2600 2b18e848913549f52ef1b3c99411ef5c.exe 2600 2b18e848913549f52ef1b3c99411ef5c.exe 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2600 2b18e848913549f52ef1b3c99411ef5c.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2600 2952 2b18e848913549f52ef1b3c99411ef5c.exe 27 PID 2952 wrote to memory of 2600 2952 2b18e848913549f52ef1b3c99411ef5c.exe 27 PID 2952 wrote to memory of 2600 2952 2b18e848913549f52ef1b3c99411ef5c.exe 27 PID 2952 wrote to memory of 2600 2952 2b18e848913549f52ef1b3c99411ef5c.exe 27 PID 2952 wrote to memory of 2600 2952 2b18e848913549f52ef1b3c99411ef5c.exe 27 PID 2952 wrote to memory of 2600 2952 2b18e848913549f52ef1b3c99411ef5c.exe 27 PID 2952 wrote to memory of 2600 2952 2b18e848913549f52ef1b3c99411ef5c.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b18e848913549f52ef1b3c99411ef5c.exe"C:\Users\Admin\AppData\Local\Temp\2b18e848913549f52ef1b3c99411ef5c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\2b18e848913549f52ef1b3c99411ef5c.exe"C:\Users\Admin\AppData\Local\Temp\2b18e848913549f52ef1b3c99411ef5c.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2600
-