Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    17/05/2023, 07:16

General

  • Target

    tmp.exe

  • Size

    887KB

  • MD5

    c19b70381457c1bf947f4befc79dc507

  • SHA1

    c290b39b8078e473c6d7eefa8aac2f7a1b7b5376

  • SHA256

    e3605326017c58a3ef50367f4821255161997f87c615c126c981526127392d3e

  • SHA512

    3189ff8c02332ba9f6b85efe12ccf6cce2125b57e8a7cdfe915a892afb344b7e4e0ee91d2fb695083419416bbc4ee7ce48cbcc4f485489fef4a5668804e2f5f1

  • SSDEEP

    12288:6LYK0aO+4fzKM/JNDFmHGoxuBslG0VKhxabmj09JgkbzZnKkAtvxiLATAGn3WtNv:6LYha+zKM/JNB6xpYnzaSjSnKk0

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5915450521:AAHBL9CEnsFid-IQ0sl0oVZia7TI3t-wPPY/sendMessage?chat_id=5061956073

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 6 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:580

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/580-66-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/580-64-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/580-71-0x00000000048D0000-0x0000000004910000-memory.dmp

    Filesize

    256KB

  • memory/580-70-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/580-68-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/580-65-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/580-61-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/580-63-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/580-62-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2024-55-0x0000000004EA0000-0x0000000004EE0000-memory.dmp

    Filesize

    256KB

  • memory/2024-60-0x00000000009B0000-0x00000000009D8000-memory.dmp

    Filesize

    160KB

  • memory/2024-59-0x0000000005B80000-0x0000000005C20000-memory.dmp

    Filesize

    640KB

  • memory/2024-54-0x0000000001300000-0x00000000013E4000-memory.dmp

    Filesize

    912KB

  • memory/2024-58-0x0000000000340000-0x000000000034C000-memory.dmp

    Filesize

    48KB

  • memory/2024-57-0x0000000000310000-0x000000000032E000-memory.dmp

    Filesize

    120KB

  • memory/2024-56-0x0000000004EA0000-0x0000000004EE0000-memory.dmp

    Filesize

    256KB