Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 04:03

General

  • Target

    7e97e6e6ccae12c62ee828a165fc3c0945026440716621d90abc77a1f7fc5c62.exe

  • Size

    1.3MB

  • MD5

    bd872ba52ce39a98cafeb40929e262a5

  • SHA1

    3e07fd75182b19df884e838efcbae0b4d7303dd4

  • SHA256

    7e97e6e6ccae12c62ee828a165fc3c0945026440716621d90abc77a1f7fc5c62

  • SHA512

    d0a35363007737631ed34a52e4cc1181f46fbe96177e360bd70bfc931546758e5e8088d02fd09cdc54c41ba524ab1264db05d4ff3455949bb73265b103f859d3

  • SSDEEP

    24576:SRPuEL3DiXwK5FN3fiVcsR5jUSrPCzqNz1TL4kGT3nYaBZ2iUP:SRGELD81FNycsR542VpTL4k6Y9R

Malware Config

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e97e6e6ccae12c62ee828a165fc3c0945026440716621d90abc77a1f7fc5c62.exe
    "C:\Users\Admin\AppData\Local\Temp\7e97e6e6ccae12c62ee828a165fc3c0945026440716621d90abc77a1f7fc5c62.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:588
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout 10
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Windows\SysWOW64\timeout.exe
        timeout 10
        3⤵
        • System Location Discovery: System Language Discovery
        • Delays execution with timeout.exe
        PID:2840
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout 10
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Windows\SysWOW64\timeout.exe
        timeout 10
        3⤵
        • System Location Discovery: System Language Discovery
        • Delays execution with timeout.exe
        PID:2876
    • C:\Users\Admin\AppData\Local\Temp\7e97e6e6ccae12c62ee828a165fc3c0945026440716621d90abc77a1f7fc5c62.exe
      "C:\Users\Admin\AppData\Local\Temp\7e97e6e6ccae12c62ee828a165fc3c0945026440716621d90abc77a1f7fc5c62.exe"
      2⤵
        PID:5652

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/588-22-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-38-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-2-0x00000000745D0000-0x0000000074CBE000-memory.dmp

      Filesize

      6.9MB

    • memory/588-3-0x0000000005A10000-0x0000000005AEC000-memory.dmp

      Filesize

      880KB

    • memory/588-4-0x00000000745DE000-0x00000000745DF000-memory.dmp

      Filesize

      4KB

    • memory/588-5-0x00000000745D0000-0x0000000074CBE000-memory.dmp

      Filesize

      6.9MB

    • memory/588-6-0x00000000745D0000-0x0000000074CBE000-memory.dmp

      Filesize

      6.9MB

    • memory/588-16-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-7-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-8-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-36-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-12-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-40-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-42-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-44-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-20-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-34-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-32-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-30-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-28-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-26-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-24-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-1-0x0000000001170000-0x00000000012B8000-memory.dmp

      Filesize

      1.3MB

    • memory/588-0-0x00000000745DE000-0x00000000745DF000-memory.dmp

      Filesize

      4KB

    • memory/588-48-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-14-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-10-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-50-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-56-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-60-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-62-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-64-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-68-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-70-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-66-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-58-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-54-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-52-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-18-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-46-0x0000000005A10000-0x0000000005AE6000-memory.dmp

      Filesize

      856KB

    • memory/588-1043-0x00000000745D0000-0x0000000074CBE000-memory.dmp

      Filesize

      6.9MB

    • memory/588-1044-0x00000000010A0000-0x00000000010FC000-memory.dmp

      Filesize

      368KB

    • memory/588-1045-0x0000000004990000-0x00000000049DC000-memory.dmp

      Filesize

      304KB

    • memory/588-1046-0x0000000005930000-0x0000000005984000-memory.dmp

      Filesize

      336KB

    • memory/588-1056-0x00000000745D0000-0x0000000074CBE000-memory.dmp

      Filesize

      6.9MB

    • memory/5652-1055-0x0000000000401000-0x000000000040B000-memory.dmp

      Filesize

      40KB