Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
02/08/2023, 08:48
Static task
static1
Behavioral task
behavioral1
Sample
3f1101fc46386a1a429d486be5d8bae3.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3f1101fc46386a1a429d486be5d8bae3.exe
Resource
win10v2004-20230703-en
General
-
Target
3f1101fc46386a1a429d486be5d8bae3.exe
-
Size
365KB
-
MD5
3f1101fc46386a1a429d486be5d8bae3
-
SHA1
b7654e3c896f147d1849749e9fce418be7b28859
-
SHA256
dc9a1f9a6534e1fb2a7cdd410b0d94b8a55eebef7f26302f358c2f715fe3d30e
-
SHA512
b6ac741b5af7994bf84d9e5c20e4f0f800390792fbee11dda68ff0139fe9c4c32fe83ceb198393d976673de53abd6c07414014a9fa55c036716d358ebe877759
-
SSDEEP
6144:mDW5mfXMetOQbuRZCewRjdcxxyZkUHtl73LpsgrpeXbDIIPPCUMFulS+42:t5m/XOQyRZgdcxxyZb3LpfbEnlS+42
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.alroman.com - Port:
587 - Username:
[email protected] - Password:
abc@24638 - Email To:
[email protected]
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 6 IoCs
resource yara_rule behavioral1/memory/2108-63-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2108-64-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2108-67-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2108-69-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2108-72-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2108-74-0x00000000003A0000-0x00000000003E0000-memory.dmp family_snakekeylogger -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2388 set thread context of 2108 2388 3f1101fc46386a1a429d486be5d8bae3.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 2892 2108 WerFault.exe 30 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2108 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2108 RegSvcs.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2108 2388 3f1101fc46386a1a429d486be5d8bae3.exe 30 PID 2388 wrote to memory of 2108 2388 3f1101fc46386a1a429d486be5d8bae3.exe 30 PID 2388 wrote to memory of 2108 2388 3f1101fc46386a1a429d486be5d8bae3.exe 30 PID 2388 wrote to memory of 2108 2388 3f1101fc46386a1a429d486be5d8bae3.exe 30 PID 2388 wrote to memory of 2108 2388 3f1101fc46386a1a429d486be5d8bae3.exe 30 PID 2388 wrote to memory of 2108 2388 3f1101fc46386a1a429d486be5d8bae3.exe 30 PID 2388 wrote to memory of 2108 2388 3f1101fc46386a1a429d486be5d8bae3.exe 30 PID 2388 wrote to memory of 2108 2388 3f1101fc46386a1a429d486be5d8bae3.exe 30 PID 2388 wrote to memory of 2108 2388 3f1101fc46386a1a429d486be5d8bae3.exe 30 PID 2388 wrote to memory of 2108 2388 3f1101fc46386a1a429d486be5d8bae3.exe 30 PID 2388 wrote to memory of 2108 2388 3f1101fc46386a1a429d486be5d8bae3.exe 30 PID 2388 wrote to memory of 2108 2388 3f1101fc46386a1a429d486be5d8bae3.exe 30 PID 2108 wrote to memory of 2892 2108 RegSvcs.exe 31 PID 2108 wrote to memory of 2892 2108 RegSvcs.exe 31 PID 2108 wrote to memory of 2892 2108 RegSvcs.exe 31 PID 2108 wrote to memory of 2892 2108 RegSvcs.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f1101fc46386a1a429d486be5d8bae3.exe"C:\Users\Admin\AppData\Local\Temp\3f1101fc46386a1a429d486be5d8bae3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 9723⤵
- Program crash
PID:2892
-
-