Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

03/07/2024, 22:59 UTC

240703-2yn7wszhlp 10

03/07/2024, 16:13 UTC

240703-tn93lsyglf 10

03/07/2024, 16:11 UTC

240703-tm84xsyfma 10

10/05/2024, 16:25 UTC

240510-tw1h5shh47 10

24/08/2023, 11:16 UTC

230824-nda8msdf8z 10

Analysis

  • max time kernel
    1795s
  • max time network
    1350s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    22/11/2020, 06:42 UTC

General

  • Target

    Endermanch@AntivirusPro2017.exe

  • Size

    816KB

  • MD5

    7dfbfba1e4e64a946cb096bfc937fbad

  • SHA1

    9180d2ce387314cd4a794d148ea6b14084c61e1b

  • SHA256

    312f082ea8f64609d30ff62b11f564107bf7a4ec9e95944dfd3da57c6cdb4e94

  • SHA512

    f47b05b9c294688811dd72d17f815cce6c90f96d78f6835804d5182e2f4bfbd2d6738de854b8a79dea6345f9372ba76a36920e51e6cb556ef4b38b620e887eb4

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 56 IoCs
  • Suspicious use of SendNotifyMessage 56 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Endermanch@AntivirusPro2017.exe
    "C:\Users\Admin\AppData\Local\Temp\Endermanch@AntivirusPro2017.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:796
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x3e4
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1800

Network

  • flag-unknown
    DNS
    twinkcam.net
    Remote address:
    8.8.8.8:53
    Request
    twinkcam.net
    IN A
    Response
    twinkcam.net
    IN A
    169.62.154.118
  • flag-unknown
    GET
    http://twinkcam.net/images/v.php?id=1
    Endermanch@AntivirusPro2017.exe
    Remote address:
    169.62.154.118:80
    Request
    GET /images/v.php?id=1 HTTP/1.1
    User-Agent: Mozilla
    Host: twinkcam.net
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Date: Sun, 22 Nov 2020 06:46:13 GMT
    Server: Apache
    Content-Length: 0
    Content-Type: text/html; charset=UTF-8
  • 169.62.154.118:80
    http://twinkcam.net/images/v.php?id=1
    http
    Endermanch@AntivirusPro2017.exe
    653 B
    303 B
    12
    4

    HTTP Request

    GET http://twinkcam.net/images/v.php?id=1

    HTTP Response

    200
  • 8.8.8.8:53
    twinkcam.net
    dns
    58 B
    74 B
    1
    1

    DNS Request

    twinkcam.net

    DNS Response

    169.62.154.118

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.