Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/11/2024, 08:47 UTC

General

  • Target

    a71b161796d07394e22622bcab68843b2ab11d60300bcc9e95bfb1d357b1b504.exe

  • Size

    326KB

  • MD5

    b0906b5db32a0cebe457bf21ceebb524

  • SHA1

    3fca8542abc43270cd66176360e159e87195fcf2

  • SHA256

    a71b161796d07394e22622bcab68843b2ab11d60300bcc9e95bfb1d357b1b504

  • SHA512

    4a3a812e6aff7571d27f7bad3cd0f3058df40ef93cfee4f0e692220b948db259866559d1ffa3f6d9dfeb67a6abcd790933f81d11f800dc87651997f363a3724c

  • SSDEEP

    6144:wd0ZKC9LI9X0EUiodLtU0WeYR6mZ2+sPZe4pLje1atpBYQW:wyr9uX0EUiodW8YQ24ljaatUQW

Malware Config

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Smokeloader family
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a71b161796d07394e22622bcab68843b2ab11d60300bcc9e95bfb1d357b1b504.exe
    "C:\Users\Admin\AppData\Local\Temp\a71b161796d07394e22622bcab68843b2ab11d60300bcc9e95bfb1d357b1b504.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 136
      2⤵
      • Program crash
      PID:2392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1560-1-0x0000000000600000-0x0000000000700000-memory.dmp

    Filesize

    1024KB

  • memory/1560-3-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1560-2-0x0000000000220000-0x0000000000229000-memory.dmp

    Filesize

    36KB

  • memory/1560-4-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.