Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
116s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/01/2023, 09:05
Static task
static1
Behavioral task
behavioral1
Sample
Withholdin TAX GOSUBKK80262088.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Withholdin TAX GOSUBKK80262088.exe
Resource
win10v2004-20220812-en
General
-
Target
Withholdin TAX GOSUBKK80262088.exe
-
Size
701KB
-
MD5
a48965da2c57db3d3cd6f9177e8ecbfa
-
SHA1
a67559012be15fd65de4cb81094cc7606d37f762
-
SHA256
cc42d9dd41c3cbb5fe3b00ea058b154e35d2bf3fc5308257a40ab1626d784d4c
-
SHA512
c3b87df13f155288f5ab5779f133d53e61171eb4bb79714d55df7daad4e9e99652d59271c98fa604cc7ef9554286a6bdd9420f9c7043cb9c9ef68469556e212a
-
SSDEEP
12288:VxEOxdueS0pn2iNUdrF6GssqLr2uLqV9i5zkYk2UX+oNa:VxEO7zn1GFF6GstLCuUk5CO
Malware Config
Extracted
lokibot
http://171.22.30.164/sharon/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Withholdin TAX GOSUBKK80262088.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Withholdin TAX GOSUBKK80262088.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Withholdin TAX GOSUBKK80262088.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1920 set thread context of 860 1920 Withholdin TAX GOSUBKK80262088.exe 28 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 860 Withholdin TAX GOSUBKK80262088.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 860 Withholdin TAX GOSUBKK80262088.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1920 wrote to memory of 860 1920 Withholdin TAX GOSUBKK80262088.exe 28 PID 1920 wrote to memory of 860 1920 Withholdin TAX GOSUBKK80262088.exe 28 PID 1920 wrote to memory of 860 1920 Withholdin TAX GOSUBKK80262088.exe 28 PID 1920 wrote to memory of 860 1920 Withholdin TAX GOSUBKK80262088.exe 28 PID 1920 wrote to memory of 860 1920 Withholdin TAX GOSUBKK80262088.exe 28 PID 1920 wrote to memory of 860 1920 Withholdin TAX GOSUBKK80262088.exe 28 PID 1920 wrote to memory of 860 1920 Withholdin TAX GOSUBKK80262088.exe 28 PID 1920 wrote to memory of 860 1920 Withholdin TAX GOSUBKK80262088.exe 28 PID 1920 wrote to memory of 860 1920 Withholdin TAX GOSUBKK80262088.exe 28 PID 1920 wrote to memory of 860 1920 Withholdin TAX GOSUBKK80262088.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Withholdin TAX GOSUBKK80262088.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Withholdin TAX GOSUBKK80262088.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Withholdin TAX GOSUBKK80262088.exe"C:\Users\Admin\AppData\Local\Temp\Withholdin TAX GOSUBKK80262088.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\Withholdin TAX GOSUBKK80262088.exe"C:\Users\Admin\AppData\Local\Temp\Withholdin TAX GOSUBKK80262088.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:860
-