Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2023, 13:36
Static task
static1
Behavioral task
behavioral1
Sample
6589987TEL.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6589987TEL.exe
Resource
win10v2004-20230220-en
General
-
Target
6589987TEL.exe
-
Size
233KB
-
MD5
9d492198c90933eb067ea7bd158d0597
-
SHA1
56950f6ba640b4edf603c5bc0f0fa7f460c807d5
-
SHA256
b4b38d7d62a408e89a3c7c0157405cf65862ddb6a1fb23a931311a468d051890
-
SHA512
1c511a295e2b6313cc7dc81cdc31a6dd9e1b7a379b67207728fdbfbb5afb977bf03ba10f17428a7a646bce95f7f4c971100aaefbabdd8d7ddba31e44ef4e06c8
-
SSDEEP
6144:JYa68XJgGIPL8bhiG7FYmjIaf76t+EmV8kPgXjd1qN:JYOJgGIj8TYmsaz6t+Eg8bTdE
Malware Config
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 4 IoCs
resource yara_rule behavioral2/memory/812-142-0x0000000000400000-0x0000000000437000-memory.dmp family_snakekeylogger behavioral2/memory/812-143-0x0000000000400000-0x0000000000437000-memory.dmp family_snakekeylogger behavioral2/memory/812-144-0x0000000000400000-0x0000000000437000-memory.dmp family_snakekeylogger behavioral2/memory/812-147-0x0000000000400000-0x0000000000437000-memory.dmp family_snakekeylogger -
Loads dropped DLL 1 IoCs
pid Process 4348 6589987TEL.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 6589987TEL.exe Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 6589987TEL.exe Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 6589987TEL.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\uenjscxhdmvrb = "C:\\Users\\Admin\\AppData\\Roaming\\swgplueajfo\\xtdmirnwgbktpy.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\6589987TEL.exe\"" 6589987TEL.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4348 set thread context of 812 4348 6589987TEL.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 812 6589987TEL.exe 812 6589987TEL.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4348 6589987TEL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 812 6589987TEL.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4348 wrote to memory of 812 4348 6589987TEL.exe 82 PID 4348 wrote to memory of 812 4348 6589987TEL.exe 82 PID 4348 wrote to memory of 812 4348 6589987TEL.exe 82 PID 4348 wrote to memory of 812 4348 6589987TEL.exe 82 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 6589987TEL.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 6589987TEL.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6589987TEL.exe"C:\Users\Admin\AppData\Local\Temp\6589987TEL.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\6589987TEL.exe"C:\Users\Admin\AppData\Local\Temp\6589987TEL.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:812
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD550e221d5d1b092ff65ed797725bb47a3
SHA150767ca15666c0cd07212be4e77bd3665c9f9979
SHA25626139aad78657252eaa78f10182857f59c5dce6b5f98f2829d0478ce7364a8f1
SHA512a0824c627e108b9117c87ff06cbf04933f21a8e315807209b427118ea1f682c9c02bcda57c795cecc38e296faabb566f27437aa139070a0193b65692da722a83