Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 22:18
Static task
static1
Behavioral task
behavioral1
Sample
49eadf247a319f1ed386288b2d7a4a74.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
49eadf247a319f1ed386288b2d7a4a74.exe
Resource
win10v2004-20231215-en
General
-
Target
49eadf247a319f1ed386288b2d7a4a74.exe
-
Size
262KB
-
MD5
49eadf247a319f1ed386288b2d7a4a74
-
SHA1
543f40390319dbc47d25a08501bb8be1287f8d71
-
SHA256
dd78d58bf51e05510f783c4d1181c36efe85966a57a2aaa6acdf863f7cdb11e2
-
SHA512
03bf7d8a4258c5b3633a38d9009ec1ad1fdcf102818bec75188041093cf42973681edb0d407ab7d98445ab104cab9519de398bbfa87aa3a5e7d1aafc32e4e562
-
SSDEEP
6144:rL6l/Yi9soUT7NrkHHQlykdUD2uvGefdnCy6D4:Kl/Go6NrGQckd07SZD
Malware Config
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3512 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 3244 fibgvde 4008 fibgvde -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3576 set thread context of 2176 3576 49eadf247a319f1ed386288b2d7a4a74.exe 91 PID 3244 set thread context of 4008 3244 fibgvde 104 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 49eadf247a319f1ed386288b2d7a4a74.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 49eadf247a319f1ed386288b2d7a4a74.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 49eadf247a319f1ed386288b2d7a4a74.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fibgvde Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fibgvde Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fibgvde -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2176 49eadf247a319f1ed386288b2d7a4a74.exe 2176 49eadf247a319f1ed386288b2d7a4a74.exe 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2176 49eadf247a319f1ed386288b2d7a4a74.exe 4008 fibgvde -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3512 Process not Found Token: SeCreatePagefilePrivilege 3512 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3512 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3576 wrote to memory of 2176 3576 49eadf247a319f1ed386288b2d7a4a74.exe 91 PID 3576 wrote to memory of 2176 3576 49eadf247a319f1ed386288b2d7a4a74.exe 91 PID 3576 wrote to memory of 2176 3576 49eadf247a319f1ed386288b2d7a4a74.exe 91 PID 3576 wrote to memory of 2176 3576 49eadf247a319f1ed386288b2d7a4a74.exe 91 PID 3576 wrote to memory of 2176 3576 49eadf247a319f1ed386288b2d7a4a74.exe 91 PID 3576 wrote to memory of 2176 3576 49eadf247a319f1ed386288b2d7a4a74.exe 91 PID 3244 wrote to memory of 4008 3244 fibgvde 104 PID 3244 wrote to memory of 4008 3244 fibgvde 104 PID 3244 wrote to memory of 4008 3244 fibgvde 104 PID 3244 wrote to memory of 4008 3244 fibgvde 104 PID 3244 wrote to memory of 4008 3244 fibgvde 104 PID 3244 wrote to memory of 4008 3244 fibgvde 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\49eadf247a319f1ed386288b2d7a4a74.exe"C:\Users\Admin\AppData\Local\Temp\49eadf247a319f1ed386288b2d7a4a74.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\49eadf247a319f1ed386288b2d7a4a74.exe"C:\Users\Admin\AppData\Local\Temp\49eadf247a319f1ed386288b2d7a4a74.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2176
-
-
C:\Users\Admin\AppData\Roaming\fibgvdeC:\Users\Admin\AppData\Roaming\fibgvde1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Roaming\fibgvdeC:\Users\Admin\AppData\Roaming\fibgvde2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD549eadf247a319f1ed386288b2d7a4a74
SHA1543f40390319dbc47d25a08501bb8be1287f8d71
SHA256dd78d58bf51e05510f783c4d1181c36efe85966a57a2aaa6acdf863f7cdb11e2
SHA51203bf7d8a4258c5b3633a38d9009ec1ad1fdcf102818bec75188041093cf42973681edb0d407ab7d98445ab104cab9519de398bbfa87aa3a5e7d1aafc32e4e562