Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
168s -
max time network
221s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2022, 07:56
Static task
static1
Behavioral task
behavioral1
Sample
doc 20220726 009910 984993.pdf.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
doc 20220726 009910 984993.pdf.exe
Resource
win10v2004-20220721-en
General
-
Target
doc 20220726 009910 984993.pdf.exe
-
Size
900KB
-
MD5
e5bccfe4fba287ecb2d35ae166de15c8
-
SHA1
c308ec8b89f71d5816810ae55780152c255a1914
-
SHA256
3082e3092bb33be6fe12afd5df501b83b82c0f6046e4ef0f60bfb2cd3291c002
-
SHA512
07bd84ca40611f94b4c32f610a28e18c3c52639b67865bdfee98699afb2b14305da5b2e3d7115481b313a1de91f683fe2cb4997d7f2d6c9e7ac4e978baf8631a
Malware Config
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/5100-153-0x0000000000760000-0x000000000077A000-memory.dmp family_stormkitty -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Control Panel\International\Geo\Nation doc 20220726 009910 984993.pdf.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 98 icanhazip.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 372 set thread context of 4536 372 doc 20220726 009910 984993.pdf.exe 100 PID 4536 set thread context of 5100 4536 doc 20220726 009910 984993.pdf.exe 102 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 AppLaunch.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3560 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 372 doc 20220726 009910 984993.pdf.exe 372 doc 20220726 009910 984993.pdf.exe 372 doc 20220726 009910 984993.pdf.exe 372 doc 20220726 009910 984993.pdf.exe 372 doc 20220726 009910 984993.pdf.exe 372 doc 20220726 009910 984993.pdf.exe 372 doc 20220726 009910 984993.pdf.exe 372 doc 20220726 009910 984993.pdf.exe 372 doc 20220726 009910 984993.pdf.exe 372 doc 20220726 009910 984993.pdf.exe 372 doc 20220726 009910 984993.pdf.exe 372 doc 20220726 009910 984993.pdf.exe 372 doc 20220726 009910 984993.pdf.exe 3152 powershell.exe 372 doc 20220726 009910 984993.pdf.exe 372 doc 20220726 009910 984993.pdf.exe 372 doc 20220726 009910 984993.pdf.exe 3152 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 372 doc 20220726 009910 984993.pdf.exe Token: SeDebugPrivilege 3152 powershell.exe Token: SeDebugPrivilege 5100 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4536 doc 20220726 009910 984993.pdf.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 372 wrote to memory of 3152 372 doc 20220726 009910 984993.pdf.exe 95 PID 372 wrote to memory of 3152 372 doc 20220726 009910 984993.pdf.exe 95 PID 372 wrote to memory of 3152 372 doc 20220726 009910 984993.pdf.exe 95 PID 372 wrote to memory of 3560 372 doc 20220726 009910 984993.pdf.exe 97 PID 372 wrote to memory of 3560 372 doc 20220726 009910 984993.pdf.exe 97 PID 372 wrote to memory of 3560 372 doc 20220726 009910 984993.pdf.exe 97 PID 372 wrote to memory of 2712 372 doc 20220726 009910 984993.pdf.exe 99 PID 372 wrote to memory of 2712 372 doc 20220726 009910 984993.pdf.exe 99 PID 372 wrote to memory of 2712 372 doc 20220726 009910 984993.pdf.exe 99 PID 372 wrote to memory of 4536 372 doc 20220726 009910 984993.pdf.exe 100 PID 372 wrote to memory of 4536 372 doc 20220726 009910 984993.pdf.exe 100 PID 372 wrote to memory of 4536 372 doc 20220726 009910 984993.pdf.exe 100 PID 372 wrote to memory of 4536 372 doc 20220726 009910 984993.pdf.exe 100 PID 372 wrote to memory of 4536 372 doc 20220726 009910 984993.pdf.exe 100 PID 372 wrote to memory of 4536 372 doc 20220726 009910 984993.pdf.exe 100 PID 372 wrote to memory of 4536 372 doc 20220726 009910 984993.pdf.exe 100 PID 372 wrote to memory of 4536 372 doc 20220726 009910 984993.pdf.exe 100 PID 4536 wrote to memory of 5100 4536 doc 20220726 009910 984993.pdf.exe 102 PID 4536 wrote to memory of 5100 4536 doc 20220726 009910 984993.pdf.exe 102 PID 4536 wrote to memory of 5100 4536 doc 20220726 009910 984993.pdf.exe 102 PID 4536 wrote to memory of 5100 4536 doc 20220726 009910 984993.pdf.exe 102 PID 4536 wrote to memory of 5100 4536 doc 20220726 009910 984993.pdf.exe 102 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\doc 20220726 009910 984993.pdf.exe"C:\Users\Admin\AppData\Local\Temp\doc 20220726 009910 984993.pdf.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\fsVEzsXg.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3152
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fsVEzsXg" /XML "C:\Users\Admin\AppData\Local\Temp\tmpECBC.tmp"2⤵
- Creates scheduled task(s)
PID:3560
-
-
C:\Users\Admin\AppData\Local\Temp\doc 20220726 009910 984993.pdf.exe"C:\Users\Admin\AppData\Local\Temp\doc 20220726 009910 984993.pdf.exe"2⤵PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\doc 20220726 009910 984993.pdf.exe"C:\Users\Admin\AppData\Local\Temp\doc 20220726 009910 984993.pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:5100
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54083c365b4a23e9712d9fb589311c65f
SHA13fb128191326a593fec7028cc9c8c61463cfb63c
SHA256196797d1bfde7b2376e820ad0e32b28618e45572c49cb7f75c3b37a3dcd9e1fa
SHA512ec06f7e99fff68f09f97552090151336fd947a7ad8ac7e2cac157feaae10565da9a3a095b8fac787af7996915def332ccda2b59002eee91009c446397fdc54d6