Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
25s -
max time network
29s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe
Resource
win10-20231220-en
General
-
Target
21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe
-
Size
219KB
-
MD5
71c0797d060ae8a45196a9336fbf7b5d
-
SHA1
a2838790fa259240e53207be47535d0f89d15f40
-
SHA256
21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431
-
SHA512
2c2ae9c6510408b17a77e3ac1623a550784d2002fcaea4bf75372aeabb06a430cbe7f5543fd9631c92a545a0817f007fb65d192d75c35239c3bbb7a906fb48d9
-
SSDEEP
3072:s9L3vACvLJiX7ezDwPh0jb4rVyYI08+Yi1DrRlWwgvXF/LwHO1/D:s9L3Xv5cPhSoVyYI+KwgdDwHa
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" explorer.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\5goocc79e9.exe 5928.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\5goocc79e9.exe\DisableExceptionChainValidation 5928.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe -
Deletes itself 1 IoCs
pid Process 1304 Process not Found -
Executes dropped EXE 1 IoCs
pid Process 2712 5928.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5928.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2712 5928.exe 2608 explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2268 set thread context of 1680 2268 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe 23 -
NSIS installer 1 IoCs
resource yara_rule behavioral1/files/0x000d000000012319-68.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5928.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5928.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1680 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe 1680 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found 1304 Process not Found -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 1680 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe 2712 5928.exe 2712 5928.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeDebugPrivilege 2712 5928.exe Token: SeRestorePrivilege 2712 5928.exe Token: SeBackupPrivilege 2712 5928.exe Token: SeLoadDriverPrivilege 2712 5928.exe Token: SeCreatePagefilePrivilege 2712 5928.exe Token: SeShutdownPrivilege 2712 5928.exe Token: SeTakeOwnershipPrivilege 2712 5928.exe Token: SeChangeNotifyPrivilege 2712 5928.exe Token: SeCreateTokenPrivilege 2712 5928.exe Token: SeMachineAccountPrivilege 2712 5928.exe Token: SeSecurityPrivilege 2712 5928.exe Token: SeAssignPrimaryTokenPrivilege 2712 5928.exe Token: SeCreateGlobalPrivilege 2712 5928.exe Token: 33 2712 5928.exe Token: SeDebugPrivilege 2608 explorer.exe Token: SeRestorePrivilege 2608 explorer.exe Token: SeBackupPrivilege 2608 explorer.exe Token: SeLoadDriverPrivilege 2608 explorer.exe Token: SeCreatePagefilePrivilege 2608 explorer.exe Token: SeShutdownPrivilege 2608 explorer.exe Token: SeTakeOwnershipPrivilege 2608 explorer.exe Token: SeChangeNotifyPrivilege 2608 explorer.exe Token: SeCreateTokenPrivilege 2608 explorer.exe Token: SeMachineAccountPrivilege 2608 explorer.exe Token: SeSecurityPrivilege 2608 explorer.exe Token: SeAssignPrimaryTokenPrivilege 2608 explorer.exe Token: SeCreateGlobalPrivilege 2608 explorer.exe Token: 33 2608 explorer.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2268 wrote to memory of 1680 2268 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe 23 PID 2268 wrote to memory of 1680 2268 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe 23 PID 2268 wrote to memory of 1680 2268 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe 23 PID 2268 wrote to memory of 1680 2268 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe 23 PID 2268 wrote to memory of 1680 2268 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe 23 PID 2268 wrote to memory of 1680 2268 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe 23 PID 2268 wrote to memory of 1680 2268 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe 23 PID 1304 wrote to memory of 2712 1304 Process not Found 29 PID 1304 wrote to memory of 2712 1304 Process not Found 29 PID 1304 wrote to memory of 2712 1304 Process not Found 29 PID 1304 wrote to memory of 2712 1304 Process not Found 29 PID 2712 wrote to memory of 2608 2712 5928.exe 30 PID 2712 wrote to memory of 2608 2712 5928.exe 30 PID 2712 wrote to memory of 2608 2712 5928.exe 30 PID 2712 wrote to memory of 2608 2712 5928.exe 30 PID 2712 wrote to memory of 2608 2712 5928.exe 30 PID 2712 wrote to memory of 2608 2712 5928.exe 30 PID 2712 wrote to memory of 2608 2712 5928.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe"C:\Users\Admin\AppData\Local\Temp\21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe"C:\Users\Admin\AppData\Local\Temp\21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1680
-
-
C:\Users\Admin\AppData\Local\Temp\5928.exeC:\Users\Admin\AppData\Local\Temp\5928.exe1⤵
- Sets file execution options in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
- Modifies firewall policy service
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\75FC.exeC:\Users\Admin\AppData\Local\Temp\75FC.exe1⤵PID:2160
-
C:\Windows\system32\taskeng.exetaskeng.exe {7BB88B96-4B18-4EBF-806C-A8BE35FDB0C3} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]1⤵PID:1296
-
C:\Users\Admin\AppData\Roaming\cfddbghC:\Users\Admin\AppData\Roaming\cfddbgh2⤵PID:2164
-
C:\Users\Admin\AppData\Roaming\cfddbghC:\Users\Admin\AppData\Roaming\cfddbgh3⤵PID:2336
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
360KB
MD580c413180b6bd0dd664adc4e0665b494
SHA1e791e4a3391fc6b7bcb58399cd4fa3c52a06b940
SHA2566d99cec56614b6b8a23dfa84a50c6bbfde535411c6366ac2bcc20c9f5af62880
SHA512347f4ae6f308b37d055a6177478e45ab3838d7020abed70c7aa138d2c3771e709de204da8550aebdcaa6139d869dc7328cc7e645c4dd48d1066f9ad70225644a
-
Filesize
5.6MB
MD5f7c6d870f0de20c40388b493d2b315d2
SHA11b25397776ae0481184f151ec3e608f3b65ac8e6
SHA2564e07a3356bb6ffaa23224884b2ec5d79b6f956acc186475adac89867c0d623d9
SHA5120619a22579ee70745034c547c53180d4319c3dc5db326dfecc275cd3b3025f354a3e6fac093a925611a5e0cca5ff9dbcfbfe246d376bb173829f332b670f5655