Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
126s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
07/07/2020, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
Payment Copy.exe
Resource
win7
General
-
Target
Payment Copy.exe
-
Size
675KB
-
MD5
f6e19104e5ed3c54df87b72849134b60
-
SHA1
83089ca9e22e9f451e17104a46bcf3d73c945a31
-
SHA256
52d1f56b7ba9fdf92db971eebca08483ce300c9c76751c3f88ba687fc1355e05
-
SHA512
b43d21f8e3d150e3cb5d8d3cef51ed13d577d197f5da4a7ca658ebc9df84eb71f60e83c697472f8a0dc10c002c705ee7c39cfd524f910e10d5cafe65d0341b33
Malware Config
Extracted
lokibot
http://acpanode-sg.com/stanz/Panel/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 992 Payment Copy.exe 992 Payment Copy.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 992 wrote to memory of 1004 992 Payment Copy.exe 67 PID 992 wrote to memory of 1004 992 Payment Copy.exe 67 PID 992 wrote to memory of 1004 992 Payment Copy.exe 67 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 992 Payment Copy.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 992 set thread context of 1004 992 Payment Copy.exe 67 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1004 Payment Copy.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1004 Payment Copy.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Copy.exe"C:\Users\Admin\AppData\Local\Temp\Payment Copy.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:992 -
C:\Users\Admin\AppData\Local\Temp\Payment Copy.exe"C:\Users\Admin\AppData\Local\Temp\Payment Copy.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: RenamesItself
PID:1004
-