Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
119s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
08/07/2020, 12:11
Static task
static1
Behavioral task
behavioral1
Sample
230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe
Resource
win10
General
-
Target
230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe
-
Size
705KB
-
MD5
af2d2ebeda11b5047b44ce8d0210de9e
-
SHA1
627160e80c9ea31f013ebbf9755f9b97e8493efc
-
SHA256
230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5
-
SHA512
1dcf7d6f3ff6981b2a13a091c451135b0af2c8c2fc12d33b0dfd4eaeb2a14ec88259a5201fcad80985c97d5fb664183ea8f14978cbc037133368aba304f4a0dc
Malware Config
Extracted
lokibot
http://boeschboddenspies.com/bless/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1808 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1092 wrote to memory of 1808 1092 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe 26 PID 1092 wrote to memory of 1808 1092 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe 26 PID 1092 wrote to memory of 1808 1092 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe 26 PID 1092 wrote to memory of 1808 1092 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe 26 PID 1092 wrote to memory of 1808 1092 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe 26 PID 1092 wrote to memory of 1808 1092 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe 26 PID 1092 wrote to memory of 1808 1092 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe 26 PID 1092 wrote to memory of 1808 1092 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe 26 PID 1092 wrote to memory of 1808 1092 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe 26 PID 1092 wrote to memory of 1808 1092 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe 26 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1092 set thread context of 1808 1092 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe 26 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1808 230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe"C:\Users\Admin\AppData\Local\Temp\230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\230ad9bffe97e0ee1f8f7cbf3c6cfa2d95211d859170ee19e3e2d9b8c1cc97b5.exe"{path}"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:1808
-