Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 22:18
Static task
static1
Behavioral task
behavioral1
Sample
49eadf247a319f1ed386288b2d7a4a74.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
49eadf247a319f1ed386288b2d7a4a74.exe
Resource
win10v2004-20231215-en
General
-
Target
49eadf247a319f1ed386288b2d7a4a74.exe
-
Size
262KB
-
MD5
49eadf247a319f1ed386288b2d7a4a74
-
SHA1
543f40390319dbc47d25a08501bb8be1287f8d71
-
SHA256
dd78d58bf51e05510f783c4d1181c36efe85966a57a2aaa6acdf863f7cdb11e2
-
SHA512
03bf7d8a4258c5b3633a38d9009ec1ad1fdcf102818bec75188041093cf42973681edb0d407ab7d98445ab104cab9519de398bbfa87aa3a5e7d1aafc32e4e562
-
SSDEEP
6144:rL6l/Yi9soUT7NrkHHQlykdUD2uvGefdnCy6D4:Kl/Go6NrGQckd07SZD
Malware Config
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1368 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 1080 hbehtwu 2548 hbehtwu -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2784 set thread context of 2000 2784 49eadf247a319f1ed386288b2d7a4a74.exe 28 PID 1080 set thread context of 2548 1080 hbehtwu 33 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 49eadf247a319f1ed386288b2d7a4a74.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 49eadf247a319f1ed386288b2d7a4a74.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 49eadf247a319f1ed386288b2d7a4a74.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hbehtwu Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hbehtwu Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hbehtwu -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2000 49eadf247a319f1ed386288b2d7a4a74.exe 2000 49eadf247a319f1ed386288b2d7a4a74.exe 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2000 49eadf247a319f1ed386288b2d7a4a74.exe 2548 hbehtwu -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2000 2784 49eadf247a319f1ed386288b2d7a4a74.exe 28 PID 2784 wrote to memory of 2000 2784 49eadf247a319f1ed386288b2d7a4a74.exe 28 PID 2784 wrote to memory of 2000 2784 49eadf247a319f1ed386288b2d7a4a74.exe 28 PID 2784 wrote to memory of 2000 2784 49eadf247a319f1ed386288b2d7a4a74.exe 28 PID 2784 wrote to memory of 2000 2784 49eadf247a319f1ed386288b2d7a4a74.exe 28 PID 2784 wrote to memory of 2000 2784 49eadf247a319f1ed386288b2d7a4a74.exe 28 PID 2784 wrote to memory of 2000 2784 49eadf247a319f1ed386288b2d7a4a74.exe 28 PID 3028 wrote to memory of 1080 3028 taskeng.exe 32 PID 3028 wrote to memory of 1080 3028 taskeng.exe 32 PID 3028 wrote to memory of 1080 3028 taskeng.exe 32 PID 3028 wrote to memory of 1080 3028 taskeng.exe 32 PID 1080 wrote to memory of 2548 1080 hbehtwu 33 PID 1080 wrote to memory of 2548 1080 hbehtwu 33 PID 1080 wrote to memory of 2548 1080 hbehtwu 33 PID 1080 wrote to memory of 2548 1080 hbehtwu 33 PID 1080 wrote to memory of 2548 1080 hbehtwu 33 PID 1080 wrote to memory of 2548 1080 hbehtwu 33 PID 1080 wrote to memory of 2548 1080 hbehtwu 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\49eadf247a319f1ed386288b2d7a4a74.exe"C:\Users\Admin\AppData\Local\Temp\49eadf247a319f1ed386288b2d7a4a74.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\49eadf247a319f1ed386288b2d7a4a74.exe"C:\Users\Admin\AppData\Local\Temp\49eadf247a319f1ed386288b2d7a4a74.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2000
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {C95D2D76-A208-422F-8735-4BA0DE3C3947} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Roaming\hbehtwuC:\Users\Admin\AppData\Roaming\hbehtwu2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Roaming\hbehtwuC:\Users\Admin\AppData\Roaming\hbehtwu3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2548
-
-