Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
174s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21/05/2022, 11:35
Static task
static1
Behavioral task
behavioral1
Sample
Inquiry List For Quote.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Inquiry List For Quote.exe
Resource
win10v2004-20220414-en
General
-
Target
Inquiry List For Quote.exe
-
Size
1.1MB
-
MD5
d5df29fc9902a2b1404d1366a945ed72
-
SHA1
2c98de0881f4b3ad58fd86d9e006c8902f85d486
-
SHA256
af568c3ddd1a373a0694029fecd3406feffc6054bd3587436f1df5681cee591d
-
SHA512
b1f9d1e576f1c5115cc8199e1a1b8c5a344617900c84b9c1d914a1773c759847aa7c3d6166b5fa48f8a34319cc2c39d274a263d3f845ca741bfdb16ef7bc30fa
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 1 IoCs
resource yara_rule behavioral2/memory/4784-136-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3280 set thread context of 4784 3280 Inquiry List For Quote.exe 83 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3280 Inquiry List For Quote.exe 3280 Inquiry List For Quote.exe 4784 Inquiry List For Quote.exe 4784 Inquiry List For Quote.exe 204 powershell.exe 204 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3280 Inquiry List For Quote.exe Token: SeDebugPrivilege 4784 Inquiry List For Quote.exe Token: SeDebugPrivilege 204 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3280 wrote to memory of 4568 3280 Inquiry List For Quote.exe 82 PID 3280 wrote to memory of 4568 3280 Inquiry List For Quote.exe 82 PID 3280 wrote to memory of 4568 3280 Inquiry List For Quote.exe 82 PID 3280 wrote to memory of 4784 3280 Inquiry List For Quote.exe 83 PID 3280 wrote to memory of 4784 3280 Inquiry List For Quote.exe 83 PID 3280 wrote to memory of 4784 3280 Inquiry List For Quote.exe 83 PID 3280 wrote to memory of 4784 3280 Inquiry List For Quote.exe 83 PID 3280 wrote to memory of 4784 3280 Inquiry List For Quote.exe 83 PID 3280 wrote to memory of 4784 3280 Inquiry List For Quote.exe 83 PID 3280 wrote to memory of 4784 3280 Inquiry List For Quote.exe 83 PID 3280 wrote to memory of 4784 3280 Inquiry List For Quote.exe 83 PID 4784 wrote to memory of 640 4784 Inquiry List For Quote.exe 87 PID 4784 wrote to memory of 640 4784 Inquiry List For Quote.exe 87 PID 4784 wrote to memory of 640 4784 Inquiry List For Quote.exe 87 PID 640 wrote to memory of 204 640 cmd.exe 89 PID 640 wrote to memory of 204 640 cmd.exe 89 PID 640 wrote to memory of 204 640 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Inquiry List For Quote.exe"C:\Users\Admin\AppData\Local\Temp\Inquiry List For Quote.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\Inquiry List For Quote.exe"C:\Users\Admin\AppData\Local\Temp\Inquiry List For Quote.exe"2⤵PID:4568
-
-
C:\Users\Admin\AppData\Local\Temp\Inquiry List For Quote.exe"C:\Users\Admin\AppData\Local\Temp\Inquiry List For Quote.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Inquiry List For Quote.exe' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Inquiry List For Quote.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:204
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
507B
MD5d1a92622541a19a1840491deb2bb5e6d
SHA15b61bb7d8973644f736968ea416ec502a0ae9bce
SHA2563b453ecc382d28d36f2c3c33634d332f856389fc3d709e40cbe9be8076da7a3c
SHA512c451f1b9a3dd7c9c2acb1174c0029591f60193b99c9d2712701e182f94fdc89cf93053b402b1ffc26ff5876bec38df7e105c4fe975826acdf6bd215011bcfe41