Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
NEAS.173cf6b50cfad4fa06f6826452aeceae743a49fb7c2cdc6445961c01dc11da92exe_JC.exe
-
Size
13.4MB
-
Sample
231009-snw1badf71
-
MD5
32846f71425da8ab731ebe0016dac49f
-
SHA1
507b6fc8d7ebdbd39cbe1de91859eaa9086d9fcc
-
SHA256
173cf6b50cfad4fa06f6826452aeceae743a49fb7c2cdc6445961c01dc11da92
-
SHA512
743026e12a010b509e93d059a97c642c20c4fcd65be0efd006bee31ce2331e5b5d54128bb578de60ef5b2c403256ac60acd9c639be9ea5ad80f602e886647359
-
SSDEEP
196608:2IgCXUXYGU2MYWZ3mpejjiAN8YrOmSIFIuHB+q9LOKd/VT7cRRbYc:lgCkX1SZ3pniIzl7XhZLOKd/Wz
Static task
static1
Malware Config
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
stealc
http://5.42.65.39
-
url_path
/bed95ea4798a5204.php
Targets
-
-
Target
NEAS.173cf6b50cfad4fa06f6826452aeceae743a49fb7c2cdc6445961c01dc11da92exe_JC.exe
-
Size
13.4MB
-
MD5
32846f71425da8ab731ebe0016dac49f
-
SHA1
507b6fc8d7ebdbd39cbe1de91859eaa9086d9fcc
-
SHA256
173cf6b50cfad4fa06f6826452aeceae743a49fb7c2cdc6445961c01dc11da92
-
SHA512
743026e12a010b509e93d059a97c642c20c4fcd65be0efd006bee31ce2331e5b5d54128bb578de60ef5b2c403256ac60acd9c639be9ea5ad80f602e886647359
-
SSDEEP
196608:2IgCXUXYGU2MYWZ3mpejjiAN8YrOmSIFIuHB+q9LOKd/VT7cRRbYc:lgCkX1SZ3pniIzl7XhZLOKd/Wz
-
Glupteba payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
4Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1