Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    98s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/04/2023, 06:03

General

  • Target

    FedExInvoice013.exe

  • Size

    877KB

  • MD5

    c2744c4bab87079337e5040cec0c202c

  • SHA1

    f9a492ebcd8647eb373e889329a12bc69beca10d

  • SHA256

    0663257fdd4fc2ee70895f2d46ed462472c2eb8734bd191ab37df92555276bc3

  • SHA512

    b4500903b5d30bdd558f241ac31d2405a966ef3b6444674b3b35d01741402ce08a55deeed0bbd85bbe673491a4d4ce4e7b30608e19f008b309ebc91b448ceabf

  • SSDEEP

    12288:OqxiRq8Wzhy7/G5F4MkyzlvMjSp2O28Bu7O1mwlF6jiFOhG4q3N4X5Krg:3iRKhy7/G5GMxt67/m6uJMr

Malware Config

Signatures

  • PredatorStealer

    Predator is a modular stealer written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FedExInvoice013.exe
    "C:\Users\Admin\AppData\Local\Temp\FedExInvoice013.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:5048
    • C:\Users\Admin\AppData\Local\Temp\FedExInvoice013.exe
      "C:\Users\Admin\AppData\Local\Temp\FedExInvoice013.exe"
      2⤵
      • Checks computer location settings
      • Accesses Microsoft Outlook profiles
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:3940
      • C:\Users\Admin\AppData\Local\Temp\Zip.exe
        "C:\Users\Admin\AppData\Local\Temp\Zip.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\FedExInvoice013.exe.log

    Filesize

    1KB

    MD5

    765cff098b629b1eb49e3ef981f7001a

    SHA1

    32b7ade1f746d013371141dcebd96e0bb3faeef3

    SHA256

    ee17be860e129795491b4be61f5ac446b16f2679e056114024ffc72b2e23a9b7

    SHA512

    ca2d2ddafc2dcbeab2c93f039bdbc567d4c9e0457e741e71c432b7461a1a8165891f22112ff1b57004ba51271899555fbf001db17d2dc748bafc608817bd9474

  • C:\Users\Admin\AppData\Local\Temp\IN_BFEBFBFF00090672\ProgramList.txt

    Filesize

    1KB

    MD5

    a0069f5e66bee104f0f4f13da873e0d1

    SHA1

    54120eea530d99c973f650d9aaa01dd0925cb20a

    SHA256

    bdb1213fe1648ef523383b19fb81212395578aec6e19fc32811632788b2b1078

    SHA512

    9eab7970525d5eca04e78b576813ea06312c052f247bdc2570b94a6046fb4fc8dac63e793c4448617c726836b81d8fa825191d2d18fe872373af6282a3ee6c43

  • C:\Users\Admin\AppData\Local\Temp\IN_BFEBFBFF00090672\ProsessList.txt

    Filesize

    1KB

    MD5

    d380396ffac6f39dca047b76405c4720

    SHA1

    10aa72868b25d21fc37d4b8bc35837e29d78a8f1

    SHA256

    16b0db9765d48a9731273bf439dbb40c3bd078295151a82039f43dc83662811c

    SHA512

    b9f0651d09e17e2ff1c40799b0ba85a2f4a9fc52431df65a057de96782a8959c41203712735c0d8e4a0e426d94c0400e67558f3983f5b5a558e096ef0746eb55

  • C:\Users\Admin\AppData\Local\Temp\IN_BFEBFBFF00090672\Screenshot.png

    Filesize

    427KB

    MD5

    f44bbd50f8dfae5231d70934c29499cb

    SHA1

    0b8ba38a30046d385c18a7a261c2290016e76bb5

    SHA256

    905901c676f0546faf3c95037d265d9faaf5d753e20fbb2e5a260dda66b650bd

    SHA512

    02a7b1b860846470fd61ac89d0ed8762e8a7ef4e673400b8ceebf0d2dfc53b4dfd66b1ea4b025762b8fbf1a7ad7e9c111aabd3a9f23c6a09b22cddcb0110851d

  • C:\Users\Admin\AppData\Local\Temp\IN_BFEBFBFF00090672\info.txt

    Filesize

    315B

    MD5

    6eea27bd00b9add18c4fa4574d727b4b

    SHA1

    3b6c250f1b8fcd40408a5aba2c1d4f182e74cdef

    SHA256

    841ff088863727857a1e2d02b741cc3912ca9cb845627b2b920faf86733f3ef5

    SHA512

    adf25862a2038088202aefba5fda878407427c192b5121c7cdfdf69b41f674a5dcc1b84f3a05042a084d2e726504f6e602dd789887ebae69530e308ee95003da

  • C:\Users\Admin\AppData\Local\Temp\Zip.exe

    Filesize

    31KB

    MD5

    af07e88ec22cc90cebfda29517f101b9

    SHA1

    a9e6f4ae24abf76966d7db03af9c802e83760143

    SHA256

    1632fbff8edc50f2c7ef7bb2fe9b2c17e6472094f0d365a98e0dec2a12fa8ec2

    SHA512

    b4575af98071fc8d46c022e24bfb2c1567d7e5f3de0d8fb5fee6f876985c7780a5b145f645725ff27a15367162aa08490ac2f8dd59d705663094fe4e1eeec7bc

  • C:\Users\Admin\AppData\Local\Temp\Zip.exe

    Filesize

    31KB

    MD5

    af07e88ec22cc90cebfda29517f101b9

    SHA1

    a9e6f4ae24abf76966d7db03af9c802e83760143

    SHA256

    1632fbff8edc50f2c7ef7bb2fe9b2c17e6472094f0d365a98e0dec2a12fa8ec2

    SHA512

    b4575af98071fc8d46c022e24bfb2c1567d7e5f3de0d8fb5fee6f876985c7780a5b145f645725ff27a15367162aa08490ac2f8dd59d705663094fe4e1eeec7bc

  • C:\Users\Admin\AppData\Local\Temp\Zip.exe

    Filesize

    31KB

    MD5

    af07e88ec22cc90cebfda29517f101b9

    SHA1

    a9e6f4ae24abf76966d7db03af9c802e83760143

    SHA256

    1632fbff8edc50f2c7ef7bb2fe9b2c17e6472094f0d365a98e0dec2a12fa8ec2

    SHA512

    b4575af98071fc8d46c022e24bfb2c1567d7e5f3de0d8fb5fee6f876985c7780a5b145f645725ff27a15367162aa08490ac2f8dd59d705663094fe4e1eeec7bc

  • memory/2956-172-0x00000235AD000000-0x00000235AD012000-memory.dmp

    Filesize

    72KB

  • memory/2956-171-0x00000235ACE20000-0x00000235ACE2A000-memory.dmp

    Filesize

    40KB

  • memory/2956-169-0x00000235ADA40000-0x00000235ADF68000-memory.dmp

    Filesize

    5.2MB

  • memory/2956-168-0x00000235AD240000-0x00000235AD402000-memory.dmp

    Filesize

    1.8MB

  • memory/2956-167-0x0000023591410000-0x0000023591420000-memory.dmp

    Filesize

    64KB

  • memory/3940-148-0x0000000006B80000-0x0000000006BE6000-memory.dmp

    Filesize

    408KB

  • memory/3940-170-0x00000000056F0000-0x0000000005700000-memory.dmp

    Filesize

    64KB

  • memory/3940-149-0x00000000056F0000-0x0000000005700000-memory.dmp

    Filesize

    64KB

  • memory/3940-147-0x0000000006E50000-0x000000000737C000-memory.dmp

    Filesize

    5.2MB

  • memory/3940-146-0x0000000005FD0000-0x0000000006192000-memory.dmp

    Filesize

    1.8MB

  • memory/3940-145-0x0000000005600000-0x0000000005656000-memory.dmp

    Filesize

    344KB

  • memory/3940-144-0x00000000056F0000-0x0000000005700000-memory.dmp

    Filesize

    64KB

  • memory/3940-141-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/3940-178-0x00000000056F0000-0x0000000005700000-memory.dmp

    Filesize

    64KB

  • memory/5048-133-0x0000000000830000-0x0000000000912000-memory.dmp

    Filesize

    904KB

  • memory/5048-139-0x00000000052F0000-0x0000000005300000-memory.dmp

    Filesize

    64KB

  • memory/5048-138-0x0000000005DD0000-0x0000000005F76000-memory.dmp

    Filesize

    1.6MB

  • memory/5048-137-0x00000000052D0000-0x00000000052DA000-memory.dmp

    Filesize

    40KB

  • memory/5048-136-0x00000000052F0000-0x0000000005300000-memory.dmp

    Filesize

    64KB

  • memory/5048-135-0x0000000005310000-0x00000000053A2000-memory.dmp

    Filesize

    584KB

  • memory/5048-134-0x0000000005820000-0x0000000005DC4000-memory.dmp

    Filesize

    5.6MB

  • memory/5048-140-0x00000000072C0000-0x000000000735C000-memory.dmp

    Filesize

    624KB