Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2022, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
General
-
Target
tmp.exe
-
Size
716KB
-
MD5
cfcee5ee81b5f9170fd4b673583b5f12
-
SHA1
c1783db922cbc72c28582655448804d75cd555be
-
SHA256
8325e49180840f7c62839f6dcccc78ff1236fb5262811e019c3cc41de65db0e7
-
SHA512
5b01e83b04781eb7aadc1ffbf32799273733b322a3a54e5399295874ecf44584a40896a4e0d3c4df802613ff541a704b8c3e0c9cf9a2a7534244ae059a8fefa1
-
SSDEEP
12288:Fcr2iNvsOL/GXh8L74mBfNUstzoCnsUrYKBBHnqAAezy3rUNVJNT:er18+L74mBfNUstzo9UrlBHAf3r8JN
Malware Config
Extracted
lokibot
http://171.22.30.164/kelly/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook tmp.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook tmp.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook tmp.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 984 set thread context of 4208 984 tmp.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 984 tmp.exe 984 tmp.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4208 tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 984 tmp.exe Token: SeDebugPrivilege 4208 tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 984 wrote to memory of 3700 984 tmp.exe 84 PID 984 wrote to memory of 3700 984 tmp.exe 84 PID 984 wrote to memory of 3700 984 tmp.exe 84 PID 984 wrote to memory of 4208 984 tmp.exe 85 PID 984 wrote to memory of 4208 984 tmp.exe 85 PID 984 wrote to memory of 4208 984 tmp.exe 85 PID 984 wrote to memory of 4208 984 tmp.exe 85 PID 984 wrote to memory of 4208 984 tmp.exe 85 PID 984 wrote to memory of 4208 984 tmp.exe 85 PID 984 wrote to memory of 4208 984 tmp.exe 85 PID 984 wrote to memory of 4208 984 tmp.exe 85 PID 984 wrote to memory of 4208 984 tmp.exe 85 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook tmp.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵PID:3700
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4208
-