Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    100s
  • max time network
    166s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 16:00

General

  • Target

    PO # 6022000990 &.xlsx

  • Size

    191KB

  • MD5

    a6eb09c4ca31ee23ad6f81dae055c0ef

  • SHA1

    6fdefa1c9940bbf19cd4f1c55cd5bd3a1172c52f

  • SHA256

    203f8c913d8143680ad86c8215f19e3d97761d008af26069e9b21675dd66f39a

  • SHA512

    cd74f8c5b22a9ad2d27e2e0253ba858e006ed39f8de5e5aea431ca09a3240923ee18fb9c0f04a9c9692ec9efbc226b129c6ebc9ff08bf0a69f7e12fc8d6425d5

  • SSDEEP

    3072:9EMfCGMChX7FruHRFtffY67PVHL8kVovCv98vxCehY1L7SAvsOG5qrwBi9oH6/06:xfJjX7FyF9IrVhYZ77sXqEBi99/5n

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 6 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\PO # 6022000990 &.xlsx"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:964
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Loads dropped DLL
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:608
    • C:\Users\Public\vbc.exe
      "C:\Users\Public\vbc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1460
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        3⤵
        • Executes dropped EXE
        PID:568
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        3⤵
        • Executes dropped EXE
        PID:696
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        3⤵
        • Executes dropped EXE
        PID:760
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:1120

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\vbc.exe

    Filesize

    968KB

    MD5

    35ec1d1bd643ea4fa23bc542b0e59bd5

    SHA1

    f83fc85e4eb728e8118a7a29e7d6392b696ca8f2

    SHA256

    b31ee35f8f256fce872b0ae8904c8b53efb6b5aa1d502367eb6c3ce41fa2bed5

    SHA512

    3724e4a8554693c153cce34862befb544bc78d50046b16247c93ae5f67acf39ba01b9abf16baf35bea4dbfc05428f198b9e881f400347f9f5f5a2cde3f273b27

  • C:\Users\Public\vbc.exe

    Filesize

    968KB

    MD5

    35ec1d1bd643ea4fa23bc542b0e59bd5

    SHA1

    f83fc85e4eb728e8118a7a29e7d6392b696ca8f2

    SHA256

    b31ee35f8f256fce872b0ae8904c8b53efb6b5aa1d502367eb6c3ce41fa2bed5

    SHA512

    3724e4a8554693c153cce34862befb544bc78d50046b16247c93ae5f67acf39ba01b9abf16baf35bea4dbfc05428f198b9e881f400347f9f5f5a2cde3f273b27

  • C:\Users\Public\vbc.exe

    Filesize

    968KB

    MD5

    35ec1d1bd643ea4fa23bc542b0e59bd5

    SHA1

    f83fc85e4eb728e8118a7a29e7d6392b696ca8f2

    SHA256

    b31ee35f8f256fce872b0ae8904c8b53efb6b5aa1d502367eb6c3ce41fa2bed5

    SHA512

    3724e4a8554693c153cce34862befb544bc78d50046b16247c93ae5f67acf39ba01b9abf16baf35bea4dbfc05428f198b9e881f400347f9f5f5a2cde3f273b27

  • C:\Users\Public\vbc.exe

    Filesize

    968KB

    MD5

    35ec1d1bd643ea4fa23bc542b0e59bd5

    SHA1

    f83fc85e4eb728e8118a7a29e7d6392b696ca8f2

    SHA256

    b31ee35f8f256fce872b0ae8904c8b53efb6b5aa1d502367eb6c3ce41fa2bed5

    SHA512

    3724e4a8554693c153cce34862befb544bc78d50046b16247c93ae5f67acf39ba01b9abf16baf35bea4dbfc05428f198b9e881f400347f9f5f5a2cde3f273b27

  • C:\Users\Public\vbc.exe

    Filesize

    968KB

    MD5

    35ec1d1bd643ea4fa23bc542b0e59bd5

    SHA1

    f83fc85e4eb728e8118a7a29e7d6392b696ca8f2

    SHA256

    b31ee35f8f256fce872b0ae8904c8b53efb6b5aa1d502367eb6c3ce41fa2bed5

    SHA512

    3724e4a8554693c153cce34862befb544bc78d50046b16247c93ae5f67acf39ba01b9abf16baf35bea4dbfc05428f198b9e881f400347f9f5f5a2cde3f273b27

  • C:\Users\Public\vbc.exe

    Filesize

    968KB

    MD5

    35ec1d1bd643ea4fa23bc542b0e59bd5

    SHA1

    f83fc85e4eb728e8118a7a29e7d6392b696ca8f2

    SHA256

    b31ee35f8f256fce872b0ae8904c8b53efb6b5aa1d502367eb6c3ce41fa2bed5

    SHA512

    3724e4a8554693c153cce34862befb544bc78d50046b16247c93ae5f67acf39ba01b9abf16baf35bea4dbfc05428f198b9e881f400347f9f5f5a2cde3f273b27

  • \Users\Public\vbc.exe

    Filesize

    968KB

    MD5

    35ec1d1bd643ea4fa23bc542b0e59bd5

    SHA1

    f83fc85e4eb728e8118a7a29e7d6392b696ca8f2

    SHA256

    b31ee35f8f256fce872b0ae8904c8b53efb6b5aa1d502367eb6c3ce41fa2bed5

    SHA512

    3724e4a8554693c153cce34862befb544bc78d50046b16247c93ae5f67acf39ba01b9abf16baf35bea4dbfc05428f198b9e881f400347f9f5f5a2cde3f273b27

  • \Users\Public\vbc.exe

    Filesize

    968KB

    MD5

    35ec1d1bd643ea4fa23bc542b0e59bd5

    SHA1

    f83fc85e4eb728e8118a7a29e7d6392b696ca8f2

    SHA256

    b31ee35f8f256fce872b0ae8904c8b53efb6b5aa1d502367eb6c3ce41fa2bed5

    SHA512

    3724e4a8554693c153cce34862befb544bc78d50046b16247c93ae5f67acf39ba01b9abf16baf35bea4dbfc05428f198b9e881f400347f9f5f5a2cde3f273b27

  • memory/964-58-0x0000000074AB1000-0x0000000074AB3000-memory.dmp

    Filesize

    8KB

  • memory/964-90-0x0000000071D0D000-0x0000000071D18000-memory.dmp

    Filesize

    44KB

  • memory/964-60-0x0000000071D0D000-0x0000000071D18000-memory.dmp

    Filesize

    44KB

  • memory/964-89-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/964-57-0x0000000071D0D000-0x0000000071D18000-memory.dmp

    Filesize

    44KB

  • memory/964-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/964-54-0x000000002F5B1000-0x000000002F5B4000-memory.dmp

    Filesize

    12KB

  • memory/964-55-0x0000000070D21000-0x0000000070D23000-memory.dmp

    Filesize

    8KB

  • memory/1120-80-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1120-81-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1120-75-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1120-76-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1120-78-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1120-87-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1120-85-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1460-71-0x0000000001F90000-0x0000000001FB6000-memory.dmp

    Filesize

    152KB

  • memory/1460-68-0x00000000006F0000-0x000000000070C000-memory.dmp

    Filesize

    112KB

  • memory/1460-69-0x00000000006A0000-0x00000000006AC000-memory.dmp

    Filesize

    48KB

  • memory/1460-70-0x0000000005380000-0x0000000005400000-memory.dmp

    Filesize

    512KB

  • memory/1460-66-0x0000000000050000-0x0000000000148000-memory.dmp

    Filesize

    992KB