Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
63s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/11/2022, 22:05
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
General
-
Target
tmp.exe
-
Size
1.1MB
-
MD5
178ff2e386dee063633a246556caf621
-
SHA1
b6f7afc2f136c5a56a698814d5d500b6bdddf7b0
-
SHA256
1e4d15ccd3ee787324ccd48246f980a8e37495b82e962a27e9d634b14e6660bc
-
SHA512
8fbcf503ed94062ca294df0b16a401d3649b8f7d912a02c2e70d349e451ebfd69216b63257a2d76d0ffb2dba45021101f85580834314d7d0998c89e8513d46b0
-
SSDEEP
24576:XW8DET+VwfHGXG31BX8+BvFr8TAqbDORBY:BbVwfpFBX8+BvFoDaY
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
LYSV$*b4 - Email To:
[email protected]
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 6 IoCs
resource yara_rule behavioral1/memory/1680-68-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1680-70-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1680-72-0x00000000004201BE-mapping.dmp family_snakekeylogger behavioral1/memory/1680-71-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1680-74-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1680-76-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmp.exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmp.exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmp.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1488 set thread context of 1680 1488 tmp.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1708 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1488 tmp.exe 1488 tmp.exe 1680 tmp.exe 1416 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1488 tmp.exe Token: SeDebugPrivilege 1680 tmp.exe Token: SeDebugPrivilege 1416 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1488 wrote to memory of 1416 1488 tmp.exe 27 PID 1488 wrote to memory of 1416 1488 tmp.exe 27 PID 1488 wrote to memory of 1416 1488 tmp.exe 27 PID 1488 wrote to memory of 1416 1488 tmp.exe 27 PID 1488 wrote to memory of 1708 1488 tmp.exe 29 PID 1488 wrote to memory of 1708 1488 tmp.exe 29 PID 1488 wrote to memory of 1708 1488 tmp.exe 29 PID 1488 wrote to memory of 1708 1488 tmp.exe 29 PID 1488 wrote to memory of 1680 1488 tmp.exe 31 PID 1488 wrote to memory of 1680 1488 tmp.exe 31 PID 1488 wrote to memory of 1680 1488 tmp.exe 31 PID 1488 wrote to memory of 1680 1488 tmp.exe 31 PID 1488 wrote to memory of 1680 1488 tmp.exe 31 PID 1488 wrote to memory of 1680 1488 tmp.exe 31 PID 1488 wrote to memory of 1680 1488 tmp.exe 31 PID 1488 wrote to memory of 1680 1488 tmp.exe 31 PID 1488 wrote to memory of 1680 1488 tmp.exe 31 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmp.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\chzTmmOnWi.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\chzTmmOnWi" /XML "C:\Users\Admin\AppData\Local\Temp\tmp50.tmp"2⤵
- Creates scheduled task(s)
PID:1708
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1680
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5300adc513c9c98990797e383051dad90
SHA12e1688b5d82298c15387bd967e492ac65a23c431
SHA2565183ff120bf94b3cf2391f954cbf7c2a608d634ad708cc739923aa68eeda5814
SHA5126a2213283da8cf781ed13df282bceaeaa488df9f7293a4fa01f67be22521213a762bbada85e62fc6577b1fc468957d218cabdc7dd4a4e99c7bd88b205990ef6c