Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 19:20
Static task
static1
Behavioral task
behavioral1
Sample
bf6d218a8f0639049cd461bd016feb75.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bf6d218a8f0639049cd461bd016feb75.exe
Resource
win10v2004-20230220-en
General
-
Target
bf6d218a8f0639049cd461bd016feb75.exe
-
Size
520KB
-
MD5
bf6d218a8f0639049cd461bd016feb75
-
SHA1
c270b009563f5fb794f32ed1adff088e9fc47e62
-
SHA256
ae0d0c2a31f5fc59eb85300918c89dff9449822b197c41d35b372d57308aa9e5
-
SHA512
3c70aaf4b50f4b6dca5c5d5801d871af5bd29eeae60693b2e5802ab503e6385a1aaa409286963287edc7d5955b86dd0f75c905722e2d0a75faa5ae1d2ee84bea
-
SSDEEP
12288:Tzmo22fVK/XsxS6jWvVLbXXB1nErcwUmdpBOye:fmodf2iivFPg0ye
Malware Config
Extracted
lokibot
http://171.22.30.164/tmglobal/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook bf6d218a8f0639049cd461bd016feb75.exe Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook bf6d218a8f0639049cd461bd016feb75.exe Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook bf6d218a8f0639049cd461bd016feb75.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1956 set thread context of 332 1956 bf6d218a8f0639049cd461bd016feb75.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1956 bf6d218a8f0639049cd461bd016feb75.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 332 bf6d218a8f0639049cd461bd016feb75.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1956 bf6d218a8f0639049cd461bd016feb75.exe Token: SeDebugPrivilege 332 bf6d218a8f0639049cd461bd016feb75.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1212 1956 bf6d218a8f0639049cd461bd016feb75.exe 28 PID 1956 wrote to memory of 1212 1956 bf6d218a8f0639049cd461bd016feb75.exe 28 PID 1956 wrote to memory of 1212 1956 bf6d218a8f0639049cd461bd016feb75.exe 28 PID 1956 wrote to memory of 1212 1956 bf6d218a8f0639049cd461bd016feb75.exe 28 PID 1956 wrote to memory of 332 1956 bf6d218a8f0639049cd461bd016feb75.exe 29 PID 1956 wrote to memory of 332 1956 bf6d218a8f0639049cd461bd016feb75.exe 29 PID 1956 wrote to memory of 332 1956 bf6d218a8f0639049cd461bd016feb75.exe 29 PID 1956 wrote to memory of 332 1956 bf6d218a8f0639049cd461bd016feb75.exe 29 PID 1956 wrote to memory of 332 1956 bf6d218a8f0639049cd461bd016feb75.exe 29 PID 1956 wrote to memory of 332 1956 bf6d218a8f0639049cd461bd016feb75.exe 29 PID 1956 wrote to memory of 332 1956 bf6d218a8f0639049cd461bd016feb75.exe 29 PID 1956 wrote to memory of 332 1956 bf6d218a8f0639049cd461bd016feb75.exe 29 PID 1956 wrote to memory of 332 1956 bf6d218a8f0639049cd461bd016feb75.exe 29 PID 1956 wrote to memory of 332 1956 bf6d218a8f0639049cd461bd016feb75.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook bf6d218a8f0639049cd461bd016feb75.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook bf6d218a8f0639049cd461bd016feb75.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf6d218a8f0639049cd461bd016feb75.exe"C:\Users\Admin\AppData\Local\Temp\bf6d218a8f0639049cd461bd016feb75.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\bf6d218a8f0639049cd461bd016feb75.exe"C:\Users\Admin\AppData\Local\Temp\bf6d218a8f0639049cd461bd016feb75.exe"2⤵PID:1212
-
-
C:\Users\Admin\AppData\Local\Temp\bf6d218a8f0639049cd461bd016feb75.exe"C:\Users\Admin\AppData\Local\Temp\bf6d218a8f0639049cd461bd016feb75.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:332
-