Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
24/01/2025, 23:30
250124-3hgcsatray 1009/04/2024, 08:35
240409-kg6xyaag48 1009/04/2024, 08:35
240409-kg2m8aea6s 1009/04/2024, 08:35
240409-kg12paag46 1009/04/2024, 08:35
240409-kg1qxsag45 1023/02/2024, 00:53
240223-a8rxzsha6z 1022/02/2024, 06:18
240222-g2y62sdc6x 10Analysis
-
max time kernel
1201s -
max time network
1167s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 08:35
Static task
static1
Behavioral task
behavioral1
Sample
d874c5f6b10e26cfd96af59be1a40b173d0614770703a36fb84dd855900fd78c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d874c5f6b10e26cfd96af59be1a40b173d0614770703a36fb84dd855900fd78c.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
d874c5f6b10e26cfd96af59be1a40b173d0614770703a36fb84dd855900fd78c.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
d874c5f6b10e26cfd96af59be1a40b173d0614770703a36fb84dd855900fd78c.exe
Resource
win11-20240221-en
General
-
Target
d874c5f6b10e26cfd96af59be1a40b173d0614770703a36fb84dd855900fd78c.exe
-
Size
141KB
-
MD5
3151d44dd03886e5f64f34481b116c81
-
SHA1
ebef87d5fd54925493385fbff5ba4d175c046fbc
-
SHA256
d874c5f6b10e26cfd96af59be1a40b173d0614770703a36fb84dd855900fd78c
-
SHA512
6ebcb293583a6858a023bf71a347783b788064f9415421503155e2f87426ff52d7881f2a680331d4332e4062153901295f4b92771a1afd527624bb15230bbcc6
-
SSDEEP
3072:p13jvfNcgSRb5hPi9OTtA5HljuEa9ckZKD4Xxh:bTX2gSJL3t0HlyEa9cM
Malware Config
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3400 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 3296 jueubhi 1696 jueubhi -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d874c5f6b10e26cfd96af59be1a40b173d0614770703a36fb84dd855900fd78c.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jueubhi Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jueubhi Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jueubhi Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d874c5f6b10e26cfd96af59be1a40b173d0614770703a36fb84dd855900fd78c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d874c5f6b10e26cfd96af59be1a40b173d0614770703a36fb84dd855900fd78c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jueubhi Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jueubhi Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jueubhi -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 968 d874c5f6b10e26cfd96af59be1a40b173d0614770703a36fb84dd855900fd78c.exe 968 d874c5f6b10e26cfd96af59be1a40b173d0614770703a36fb84dd855900fd78c.exe 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 968 d874c5f6b10e26cfd96af59be1a40b173d0614770703a36fb84dd855900fd78c.exe 3296 jueubhi 1696 jueubhi -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3400 Process not Found Token: SeCreatePagefilePrivilege 3400 Process not Found Token: SeShutdownPrivilege 3400 Process not Found Token: SeCreatePagefilePrivilege 3400 Process not Found Token: SeShutdownPrivilege 3400 Process not Found Token: SeCreatePagefilePrivilege 3400 Process not Found Token: SeShutdownPrivilege 3400 Process not Found Token: SeCreatePagefilePrivilege 3400 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3400 Process not Found -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d874c5f6b10e26cfd96af59be1a40b173d0614770703a36fb84dd855900fd78c.exe"C:\Users\Admin\AppData\Local\Temp\d874c5f6b10e26cfd96af59be1a40b173d0614770703a36fb84dd855900fd78c.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:968
-
C:\Users\Admin\AppData\Roaming\jueubhiC:\Users\Admin\AppData\Roaming\jueubhi1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3296
-
C:\Users\Admin\AppData\Roaming\jueubhiC:\Users\Admin\AppData\Roaming\jueubhi1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141KB
MD53151d44dd03886e5f64f34481b116c81
SHA1ebef87d5fd54925493385fbff5ba4d175c046fbc
SHA256d874c5f6b10e26cfd96af59be1a40b173d0614770703a36fb84dd855900fd78c
SHA5126ebcb293583a6858a023bf71a347783b788064f9415421503155e2f87426ff52d7881f2a680331d4332e4062153901295f4b92771a1afd527624bb15230bbcc6