Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10CleanerV2.exe
windows7-x64
10CleanerV2.exe
windows10-2004-x64
10InstallSetup.exe
windows7-x64
8InstallSetup.exe
windows10-2004-x64
10Motrix-1.8.19-x64.exe
windows7-x64
7Motrix-1.8.19-x64.exe
windows10-2004-x64
7Rust_22_02...np.exe
windows7-x64
3Rust_22_02...np.exe
windows10-2004-x64
3SoftCPU.exe
windows7-x64
3SoftCPU.exe
windows10-2004-x64
7chrome.exe
windows7-x64
8chrome.exe
windows10-2004-x64
8client.exe
windows7-x64
10client.exe
windows10-2004-x64
10goodboy.exe
windows10-2004-x64
10install.exe
windows7-x64
10install.exe
windows10-2004-x64
10Resubmissions
14/03/2025, 13:03
250314-qacneavkv5 10Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14/03/2025, 13:03
Behavioral task
behavioral1
Sample
CleanerV2.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
CleanerV2.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral3
Sample
InstallSetup.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
InstallSetup.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral5
Sample
Motrix-1.8.19-x64.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Motrix-1.8.19-x64.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral7
Sample
Rust_22_02_2023_gnp.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Rust_22_02_2023_gnp.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral9
Sample
SoftCPU.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
SoftCPU.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
chrome.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
chrome.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral13
Sample
client.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
client.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
goodboy.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral16
Sample
install.exe
Resource
win7-20241010-en
Behavioral task
behavioral17
Sample
install.exe
Resource
win10v2004-20250314-en
General
-
Target
client.exe
-
Size
103KB
-
MD5
b53bbcfca226226405217bba4f8b2532
-
SHA1
6a84eb91adb4ec5b3b18929fb5e0bfd39cc41fb2
-
SHA256
be09ac01404b9a32552b8bea765128a3e197a4bf77e909892d00aa2d157d6871
-
SHA512
f8b51680dbca520ed6877ca5cc1a003258a03bdd802c69985d658375562608c004084463363c9a2ed92b7552c36ba729b1863a1693990186e0f188ff3cc1ec86
-
SSDEEP
1536:KOhk60PnYkfH77Xcsg23bH/0cRDrKOyaxPoWvVVZ5ElaSePrpf3n3:HuJ/hRvg2TzEla3PVH
Malware Config
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral13/memory/1176-1-0x00000000001A0000-0x00000000001C0000-memory.dmp net_reactor -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1176 set thread context of 2772 1176 client.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 2880 1176 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1176 wrote to memory of 2772 1176 client.exe 29 PID 1176 wrote to memory of 2772 1176 client.exe 29 PID 1176 wrote to memory of 2772 1176 client.exe 29 PID 1176 wrote to memory of 2772 1176 client.exe 29 PID 1176 wrote to memory of 2772 1176 client.exe 29 PID 1176 wrote to memory of 2772 1176 client.exe 29 PID 1176 wrote to memory of 2772 1176 client.exe 29 PID 1176 wrote to memory of 2880 1176 client.exe 30 PID 1176 wrote to memory of 2880 1176 client.exe 30 PID 1176 wrote to memory of 2880 1176 client.exe 30 PID 1176 wrote to memory of 2880 1176 client.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\client.exe"C:\Users\Admin\AppData\Local\Temp\client.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\client.exe"C:\Users\Admin\AppData\Local\Temp\client.exe"2⤵PID:2772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1176 -s 5202⤵
- Program crash
PID:2880
-