Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
09/07/2020, 07:47
Static task
static1
Behavioral task
behavioral1
Sample
57ce7dd66cb6de7e30b23e6257635e9d.exe
Resource
win7v200430
General
-
Target
57ce7dd66cb6de7e30b23e6257635e9d.exe
-
Size
831KB
-
MD5
57ce7dd66cb6de7e30b23e6257635e9d
-
SHA1
1db54d45554ab3f24e543b01365c8eeb9c9228ef
-
SHA256
67951f5d6430b7151a5a3d3a05dc5c630279f4113924cd9d9d5e90162d676f52
-
SHA512
eb0858b20d3eb90c98258bc5e36b973a234eccbf354bfd07b7a4d4a69e33d84f60908bac53db3d025e979e7e61293bee36f108b761647b7f9610bb2bea78c6bb
Malware Config
Extracted
lokibot
http://emdadbimarz.ir/huhn/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 664 set thread context of 1276 664 57ce7dd66cb6de7e30b23e6257635e9d.exe 68 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1276 57ce7dd66cb6de7e30b23e6257635e9d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1276 57ce7dd66cb6de7e30b23e6257635e9d.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 664 57ce7dd66cb6de7e30b23e6257635e9d.exe 664 57ce7dd66cb6de7e30b23e6257635e9d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 664 wrote to memory of 1276 664 57ce7dd66cb6de7e30b23e6257635e9d.exe 68 PID 664 wrote to memory of 1276 664 57ce7dd66cb6de7e30b23e6257635e9d.exe 68 PID 664 wrote to memory of 1276 664 57ce7dd66cb6de7e30b23e6257635e9d.exe 68 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 664 57ce7dd66cb6de7e30b23e6257635e9d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\57ce7dd66cb6de7e30b23e6257635e9d.exe"C:\Users\Admin\AppData\Local\Temp\57ce7dd66cb6de7e30b23e6257635e9d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
PID:664 -
C:\Users\Admin\AppData\Local\Temp\57ce7dd66cb6de7e30b23e6257635e9d.exe"C:\Users\Admin\AppData\Local\Temp\57ce7dd66cb6de7e30b23e6257635e9d.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: RenamesItself
PID:1276
-