Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
20/09/2022, 21:58 UTC
Behavioral task
behavioral1
Sample
UHAP Sorgu.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
UHAP Sorgu.exe
Resource
win10-20220812-en
General
-
Target
UHAP Sorgu.exe
-
Size
274KB
-
MD5
918437b1fb7cb9007f0d439396cc392c
-
SHA1
1889c245e9eb55889f40f42efdd2315c40ce414e
-
SHA256
05192de4246ba6acd7799d2137b4a1f1ec5520d129d68cec2b2976b2c1bea90e
-
SHA512
b2df6e41d0376f4f7c8b2144aec63f5dd55f82e8acc8d25b318ffb443bf32de637ae6c1c0ecc00278bef9d59c2fca515cead5690c9b19669adefdbc6205aa0ef
-
SSDEEP
6144:Yf+BLtABPDlgj1xw1eO5rbEMzpgUsY3hiGUClYeJilA1D0c3/:1161eO5rbrHsY3hiG7lYeV1Df/
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/922935347015462933/U9oJsXDPRrEd39o5K-4lVEYCqki7VlOAgiWIlgpKTFSm1UWAneR5bQBsRr3zcmw4JPEL
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 freegeoip.app 2 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 UHAP Sorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier UHAP Sorgu.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1148 UHAP Sorgu.exe 1148 UHAP Sorgu.exe 1148 UHAP Sorgu.exe 1148 UHAP Sorgu.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1148 UHAP Sorgu.exe
Processes
Network
-
Remote address:8.8.8.8:53Requestfreegeoip.appIN AResponsefreegeoip.appIN A188.114.96.0freegeoip.appIN A188.114.97.0
-
Remote address:188.114.96.0:443RequestGET /xml/ HTTP/1.1
Host: freegeoip.app
Connection: Keep-Alive
ResponseHTTP/1.1 301 Moved Permanently
Transfer-Encoding: chunked
Connection: keep-alive
Cache-Control: max-age=3600
Expires: Tue, 20 Sep 2022 22:59:07 GMT
Location: https://ipbase.com/xml/
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=NEIgi%2FiEl%2FetCX%2Fp19oVDSWHJV7J%2BfPpDOnJcHyloZ%2FnHUhb5kDut3SXKxNgcTOmMECoqX5vpzUNwqhYP87BPC953WjxXu4BJfJiISA%2FRJsCpAmxjD5GIxufjlm0%2FMt8"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 74ddd38d5bc3b920-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:8.8.8.8:53Requestipbase.comIN AResponseipbase.comIN A75.2.60.5ipbase.comIN A99.83.231.61
-
Remote address:75.2.60.5:443RequestGET /xml/ HTTP/1.1
Host: ipbase.com
Connection: Keep-Alive
ResponseHTTP/1.1 404 Not Found
Cache-Control: public, max-age=0, must-revalidate
Content-Length: 3082
Content-Type: text/html; charset=utf-8
Date: Tue, 20 Sep 2022 20:29:09 GMT
Etag: 1649775430-ssl
Server: Netlify
Strict-Transport-Security: max-age=31536000
X-Nf-Request-Id: 01GDEEJX6TZXS1NY57SPY74JBP
-
760 B 3.8kB 9 8
HTTP Request
GET https://freegeoip.app/xml/HTTP Response
301 -
800 B 8.2kB 10 12
HTTP Request
GET https://ipbase.com/xml/HTTP Response
404