Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2023, 15:43
Behavioral task
behavioral1
Sample
3410529d02cdc6ee212c44cdae46c2c0.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3410529d02cdc6ee212c44cdae46c2c0.exe
Resource
win10v2004-20230703-en
General
-
Target
3410529d02cdc6ee212c44cdae46c2c0.exe
-
Size
127KB
-
MD5
3410529d02cdc6ee212c44cdae46c2c0
-
SHA1
7061a945f2786bf28191f856d8566ea9d61e7869
-
SHA256
7d11e19dcc4a6891657f624485dfd6e3e0ed3f0cd1a4361cc922ebb95d7361ac
-
SHA512
77459455e89eb954dfb943e9ee1544055fb6e010ff9050f3c4ac3aac2f655132183f9474755825647896df55457878f1b7f6d41b4aee19a99fd8ab775c035dcb
-
SSDEEP
1536:OhrMBR29HM9mZ0kp08+vBUFrlYYnz7mrMSz+m4IsrMFPyKvn02bEb/zRWn6tlkpd:OhryR6sBkpznz5b7Rk6tlOwBINzgbY
Malware Config
Extracted
Protocol: smtp- Host:
mail.sienkakupeste.com - Port:
587 - Username:
[email protected] - Password:
010203sienka++
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.sienkakupeste.com - Port:
587 - Username:
[email protected] - Password:
010203sienka++ - Email To:
[email protected]
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral2/memory/1132-134-0x00000000000B0000-0x00000000000D6000-memory.dmp family_snakekeylogger -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 checkip.dyndns.org -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1132 3410529d02cdc6ee212c44cdae46c2c0.exe 1132 3410529d02cdc6ee212c44cdae46c2c0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1132 3410529d02cdc6ee212c44cdae46c2c0.exe