Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2022, 14:28
Static task
static1
Behavioral task
behavioral1
Sample
payload.exe
Resource
win7-20220812-en
General
-
Target
payload.exe
-
Size
185KB
-
MD5
14382242e215d139c77c0ee9bb0c7ad6
-
SHA1
3951322a28787e4757fd3715d518103d6c054960
-
SHA256
5017913bca4c5c1eaf5646e3983f9d8fc4e52f4a66406f46f3029952ae1fde70
-
SHA512
1f4eef4d4685ca466702b45fa163e31089c031d2c491b4a14279bf28cba64a1aada928536df2970399510c4efb093ab08c7a05f0223fde66e751e20c26e07a4b
-
SSDEEP
3072:yXoVNpuuK+ArjKxjCpZomp/04AkJmHrwF8gUdSl5xCZqnr/xA3unPu:bfp5SZow/04tUuUdeSqri3gu
Malware Config
Extracted
formbook
knnt
65SBubRb0cQTZyel+RrmtuIytWG7hIY=
lxY8gZLYuXPYl40/
IBCcbQLOUkWVL3cA/DkK2ei+vuKlXA==
4Lo6dar405m4hxqWl58sOc0=
4KyQBqNrzYWTI6Iv016m7BZVvuKlXA==
PyCmasPI0Lj0JTU=
hnoGNwDmybXus0PVH2S1Td2l0ZTJ
s4CRDagqgmaCo9bOBD4i
T5IbS3G46ZbN8RncbsWuAiWl0ZTJ
2vxQ/T6e+7vkjz9yriaOpBbO8bYapwAu
55558Jha4dgR7PCZrQ==
O9KAFJVY3c4V1Xi2rEGne4ZMtSY=
ZPih22lkYU3Yl40/
mCc1tbkLsWeH
MpbgOtnQvGu9jQ==
D6uAq4Gdj3UEkzmKkCOIW4BG
A3rp8NpDzp2Q
4WMaDz2Ff26SfX5xEaABgk0WTQ==
G16+qE5AFMf20h0PxfsyLIZMtSY=
az44qCVNL8dm2vG/nuEbI3K46HT5K44=
diAkZlHwTStSRz3wbh9m3G2Cqp+dCXx1rw==
ffC9ra7gsm+GqNfOBD4i
LVly43lAwJWZDHRBWt4=
5BJ9ci3CPideCnkSTOFMpg==
xGB7vLFMsI7TCAT0PuUtqThQ
0rww83cujg54ASg=
LS3WlRMiFxo74XtOS1kgIs8=
aQQRwP6zypOa
Mgrwb8EzoIDe3O2WrQ==
tSYt4jy2GsrheliJecwZMM8=
B+T9SePXvGu9jQ==
s99ZdB8C+c/axH8GOmFKLYB+wLiMCXx1rw==
9IBSZ+gLsWeH
ulV6trz5xnaepjyMUc1Mpg==
zMoShxjqZmHI9/67Uc1Mpg==
Piqq166reVusrOplow==
YuSgq8SEeVGL
s6buaf/aIwUoDQgSTOFMpg==
uXyHvZsjdhZxWeY3
qHCEy7zq79L08yq2Kl47
BVLMnc8unIHe3O2WrQ==
uUpunoQQm42p2/H0PuUtqThQ
SWEN1fdnvXze3O2WrQ==
mnBAOx+fMRJWWew3
Ma56cxfrw4+ddQl/E5xAgk0WTQ==
ZyYt3CV607oJlrmjslmquBLMgDPZJY4=
SNCgtHFSRjyJjCWKIHjSors1rKbQ
BG4fFjJnYVLe3O2WrQ==
UcmZlZjUxsLjhf2KFQxZog==
sUd0sarZ3doFIkEDaqkO4QaFvQ3YWkk7
RfILOwiC27b/hmYnk9Y=
0dIDc6IKiYG7DjE/ROJCACyl0ZTJ
S07smzJDzp2Q
PK6K+Z5q2oOjsAePug==
6hCDO5icoXmJdSis6BBsAhggVA==
TLZ4XVHzZ2DYl40/
55q88eBaDO1N1XCxj8tNQ9Q=
Cs0DeKUawVXLqH2MbLDwQJwk6bLL
31sQzJ2whlviZ/qGuA==
Ac3E9+NirYqpye70PuUtqThQ
0fo+u0n4c1riZ/qGuA==
L/klOSRT65uf
QYrnxccD99zpxNPOBD4i
1F6aSX7wSfcGYnlYfVY7OdA=
sw25502.xyz
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation payload.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4920 set thread context of 2640 4920 payload.exe 41 PID 548 set thread context of 2640 548 wscript.exe 41 -
description ioc Process Key created \Registry\User\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wscript.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4920 payload.exe 4920 payload.exe 4920 payload.exe 4920 payload.exe 4920 payload.exe 4920 payload.exe 4920 payload.exe 4920 payload.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2640 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 4920 payload.exe 4920 payload.exe 4920 payload.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe 548 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4920 payload.exe Token: SeDebugPrivilege 548 wscript.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2640 wrote to memory of 548 2640 Explorer.EXE 83 PID 2640 wrote to memory of 548 2640 Explorer.EXE 83 PID 2640 wrote to memory of 548 2640 Explorer.EXE 83 PID 548 wrote to memory of 2592 548 wscript.exe 91 PID 548 wrote to memory of 2592 548 wscript.exe 91 PID 548 wrote to memory of 2592 548 wscript.exe 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\payload.exe"C:\Users\Admin\AppData\Local\Temp\payload.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2592
-
-