Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2022, 10:16 UTC

General

  • Target

    1664899251557_MLCAL100300189.00.pdf.exe

  • Size

    418KB

  • MD5

    07483641fb9e47b6381039d8806aabc8

  • SHA1

    7f992d4eeae9bb1dc8936a833298bfd7ee870ffb

  • SHA256

    e3f0cf7effaf970e55ce7b44afa66607f8126403523b609849339d551011480f

  • SHA512

    8b3a201a85600c8cea9404515dd0be09fb2b41d952f5c795b36166cbfb20deef01c0d91c0da31a1a3f2a554d5e045160450a4965147824ac0244d602d4bd78cf

  • SSDEEP

    6144:KYa6AExBLoJvdNJDGcNc7rsJ1RqonlSpiHUtMj:KYC8LodlGcNc781RpSpdOj

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5468731092:AAGGNQWBVRhX622u6xp1moMhaunIGtXuIxg/sendMessage?chat_id=1639214896

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1664899251557_MLCAL100300189.00.pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\1664899251557_MLCAL100300189.00.pdf.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Users\Admin\AppData\Local\Temp\mxuoquv.exe
      "C:\Users\Admin\AppData\Local\Temp\mxuoquv.exe" C:\Users\Admin\AppData\Local\Temp\agvcsd.xia
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Users\Admin\AppData\Local\Temp\mxuoquv.exe
        "C:\Users\Admin\AppData\Local\Temp\mxuoquv.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1372
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          4⤵
          • Accesses Microsoft Outlook profiles
          • Checks processor information in registry
          • Suspicious use of AdjustPrivilegeToken
          • outlook_office_path
          • outlook_win_path
          PID:1872

Network

  • flag-unknown
    DNS
    icanhazip.com
    AppLaunch.exe
    Remote address:
    8.8.8.8:53
    Request
    icanhazip.com
    IN A
    Response
    icanhazip.com
    IN A
    104.18.114.97
    icanhazip.com
    IN A
    104.18.115.97
  • flag-unknown
    GET
    http://icanhazip.com/
    AppLaunch.exe
    Remote address:
    104.18.114.97:80
    Request
    GET / HTTP/1.1
    Host: icanhazip.com
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Date: Thu, 29 Dec 2022 10:16:26 GMT
    Content-Type: text/plain
    Content-Length: 13
    Connection: keep-alive
    Access-Control-Allow-Origin: *
    Access-Control-Allow-Methods: GET
    Set-Cookie: __cf_bm=LQqpK5xwKggaLTm7sw.g596qcTmHhBCR.Drq9fTAWVM-1672308986-0-AdI3i6zJ/E2Ick/jY5CSorbJISjE8RefPPFkUdp0wlAO4K1eivpMSkdy9/cwZ5KewjqTiYzk7cFw9+GV4MJHgY0=; path=/; expires=Thu, 29-Dec-22 10:46:26 GMT; domain=.icanhazip.com; HttpOnly
    Server: cloudflare
    CF-RAY: 7811c7bb29cdb779-AMS
    alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
  • 104.18.114.97:80
    http://icanhazip.com/
    http
    AppLaunch.exe
    247 B
    687 B
    4
    3

    HTTP Request

    GET http://icanhazip.com/

    HTTP Response

    200
  • 8.8.8.8:53
    icanhazip.com
    dns
    AppLaunch.exe
    59 B
    91 B
    1
    1

    DNS Request

    icanhazip.com

    DNS Response

    104.18.114.97
    104.18.115.97

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\agvcsd.xia

    Filesize

    8KB

    MD5

    90c2a3c3487e5dadeb270ce3f5c8a01c

    SHA1

    edc2d5e2b26cbabeeb8d69e8c4501f503c6e58fc

    SHA256

    7e9e63b244d5699e8217c274718ca57874a82d9bf64211a9c2029b0841270a95

    SHA512

    2d40b47980caafeb01b85d7182e4ee606d86c160fc32c13ae5f9775d323807ec3605fa600d3e82a35952d66e95cb4161be148e96cd6bf6bdd7e87be5a51bdd88

  • C:\Users\Admin\AppData\Local\Temp\kjwcrxgzt.b

    Filesize

    156KB

    MD5

    354f5a89f5197083616340a0064cf264

    SHA1

    a05ea1cb9ea0141408cf76d3672c09c4662284d4

    SHA256

    b24d24bc0071cdcec4f3ff52a4cdebc812f450927b5c9fcc7c596957e4b167bb

    SHA512

    dea51923004426dad19cefe6b52c4f3927634f2a93dc9ab1ab1154bba8269df25b953ebdbd03afe01b4d4a8d61e46295ddaf980b246578a4ad461c8a3a44b6fc

  • C:\Users\Admin\AppData\Local\Temp\mxuoquv.exe

    Filesize

    63KB

    MD5

    dddd982b03cb1e42cda0fc1bc0bc9f4c

    SHA1

    fe25abd82ae5c9bd0db39eb780b32236de5ac0dd

    SHA256

    1931caa80bc281f650739ac6c3f545d578ae839cc38890d4cd0da1484d694a5a

    SHA512

    af7b7e70c9a497a26b3cd2a136f21e98866fe56edf83baf5641df154c62a5ebf0453814ec2ed3c26a19d763d4d46c80eb45df13dc8fd8bbef4f1746e4d79b1ad

  • C:\Users\Admin\AppData\Local\Temp\mxuoquv.exe

    Filesize

    63KB

    MD5

    dddd982b03cb1e42cda0fc1bc0bc9f4c

    SHA1

    fe25abd82ae5c9bd0db39eb780b32236de5ac0dd

    SHA256

    1931caa80bc281f650739ac6c3f545d578ae839cc38890d4cd0da1484d694a5a

    SHA512

    af7b7e70c9a497a26b3cd2a136f21e98866fe56edf83baf5641df154c62a5ebf0453814ec2ed3c26a19d763d4d46c80eb45df13dc8fd8bbef4f1746e4d79b1ad

  • C:\Users\Admin\AppData\Local\Temp\mxuoquv.exe

    Filesize

    63KB

    MD5

    dddd982b03cb1e42cda0fc1bc0bc9f4c

    SHA1

    fe25abd82ae5c9bd0db39eb780b32236de5ac0dd

    SHA256

    1931caa80bc281f650739ac6c3f545d578ae839cc38890d4cd0da1484d694a5a

    SHA512

    af7b7e70c9a497a26b3cd2a136f21e98866fe56edf83baf5641df154c62a5ebf0453814ec2ed3c26a19d763d4d46c80eb45df13dc8fd8bbef4f1746e4d79b1ad

  • \Users\Admin\AppData\Local\Temp\mxuoquv.exe

    Filesize

    63KB

    MD5

    dddd982b03cb1e42cda0fc1bc0bc9f4c

    SHA1

    fe25abd82ae5c9bd0db39eb780b32236de5ac0dd

    SHA256

    1931caa80bc281f650739ac6c3f545d578ae839cc38890d4cd0da1484d694a5a

    SHA512

    af7b7e70c9a497a26b3cd2a136f21e98866fe56edf83baf5641df154c62a5ebf0453814ec2ed3c26a19d763d4d46c80eb45df13dc8fd8bbef4f1746e4d79b1ad

  • \Users\Admin\AppData\Local\Temp\mxuoquv.exe

    Filesize

    63KB

    MD5

    dddd982b03cb1e42cda0fc1bc0bc9f4c

    SHA1

    fe25abd82ae5c9bd0db39eb780b32236de5ac0dd

    SHA256

    1931caa80bc281f650739ac6c3f545d578ae839cc38890d4cd0da1484d694a5a

    SHA512

    af7b7e70c9a497a26b3cd2a136f21e98866fe56edf83baf5641df154c62a5ebf0453814ec2ed3c26a19d763d4d46c80eb45df13dc8fd8bbef4f1746e4d79b1ad

  • \Users\Admin\AppData\Local\Temp\mxuoquv.exe

    Filesize

    63KB

    MD5

    dddd982b03cb1e42cda0fc1bc0bc9f4c

    SHA1

    fe25abd82ae5c9bd0db39eb780b32236de5ac0dd

    SHA256

    1931caa80bc281f650739ac6c3f545d578ae839cc38890d4cd0da1484d694a5a

    SHA512

    af7b7e70c9a497a26b3cd2a136f21e98866fe56edf83baf5641df154c62a5ebf0453814ec2ed3c26a19d763d4d46c80eb45df13dc8fd8bbef4f1746e4d79b1ad

  • memory/1048-54-0x00000000759F1000-0x00000000759F3000-memory.dmp

    Filesize

    8KB

  • memory/1372-79-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/1372-80-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/1872-70-0x0000000000090000-0x00000000000AA000-memory.dmp

    Filesize

    104KB

  • memory/1872-72-0x0000000000090000-0x00000000000AA000-memory.dmp

    Filesize

    104KB

  • memory/1872-77-0x0000000000090000-0x00000000000AA000-memory.dmp

    Filesize

    104KB

  • memory/1872-75-0x0000000000090000-0x00000000000AA000-memory.dmp

    Filesize

    104KB

  • memory/2016-66-0x00000000000F0000-0x00000000000F3000-memory.dmp

    Filesize

    12KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.