Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
184s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
09/02/2023, 10:54
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20221111-en
General
-
Target
tmp.exe
-
Size
611KB
-
MD5
a0de6cd6ca9a510a7c5d84c2cadcf4e9
-
SHA1
571d8ee87c54d119eed3d622f1181e76c37e4493
-
SHA256
8be9f11fd4be503d013fe9ed0c38f556cd3eaa249682003df3fb907cd8a15ffc
-
SHA512
526b24837d21e0519251135fa9385f966f26e5f4820a15919a8d1461a3b460d52e5112cee0c0b423a39a28eceeaf9cbbc628d03c96245b8e75677b66b21f48ba
-
SSDEEP
12288:aC8Xppn853e6i34+qMbQv3g7ICcyU1PUGQlQX:6IRteQqcyMPUGQlQX
Malware Config
Extracted
lokibot
http://171.22.30.164/zang/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook tmp.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook tmp.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook tmp.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5016 set thread context of 3356 5016 tmp.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5016 tmp.exe 5016 tmp.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3356 tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5016 tmp.exe Token: SeDebugPrivilege 3356 tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5016 wrote to memory of 260 5016 tmp.exe 81 PID 5016 wrote to memory of 260 5016 tmp.exe 81 PID 5016 wrote to memory of 260 5016 tmp.exe 81 PID 5016 wrote to memory of 3356 5016 tmp.exe 82 PID 5016 wrote to memory of 3356 5016 tmp.exe 82 PID 5016 wrote to memory of 3356 5016 tmp.exe 82 PID 5016 wrote to memory of 3356 5016 tmp.exe 82 PID 5016 wrote to memory of 3356 5016 tmp.exe 82 PID 5016 wrote to memory of 3356 5016 tmp.exe 82 PID 5016 wrote to memory of 3356 5016 tmp.exe 82 PID 5016 wrote to memory of 3356 5016 tmp.exe 82 PID 5016 wrote to memory of 3356 5016 tmp.exe 82 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook tmp.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵PID:260
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3356
-