Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2023, 16:49 UTC

General

  • Target

    TF-24098-001.exe

  • Size

    509KB

  • MD5

    15263e7a37292fe57209c7f3c1573d55

  • SHA1

    f66db7efb5fa5fbdf4d0ed2397d9064f5de20e62

  • SHA256

    f0a380fdc3f7682a1496a867b4506c2c6258db3a13c876625032483e4d872f1c

  • SHA512

    3d8d65dfa2f293f00184112ddca0198938817a8a6bedcba088c067e31bc0a2814d3302087851f2ee0382570190c5623e6451c506f8eb5b2d62da27d19d68e6d0

  • SSDEEP

    12288:GuPiP54ahSfBTMIRGRt4W75UrruAgERNG4IpC2:RM4B4HyWI6tERJj

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.belt-tech.com.my
  • Port:
    587
  • Username:
    purchasing.pg@belt-tech.com.my
  • Password:
    Beltechpg@1234
  • Email To:
    effectmandela218@gmail.com

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TF-24098-001.exe
    "C:\Users\Admin\AppData\Local\Temp\TF-24098-001.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • outlook_office_path
    • outlook_win_path
    PID:2472

Network

  • flag-us
    DNS
    checkip.dyndns.org
    TF-24098-001.exe
    Remote address:
    8.8.8.8:53
    Request
    checkip.dyndns.org
    IN A
    Response
    checkip.dyndns.org
    IN CNAME
    checkip.dyndns.com
    checkip.dyndns.com
    IN A
    132.226.247.73
    checkip.dyndns.com
    IN A
    158.101.44.242
    checkip.dyndns.com
    IN A
    193.122.6.168
    checkip.dyndns.com
    IN A
    193.122.130.0
    checkip.dyndns.com
    IN A
    132.226.8.169
  • flag-us
    GET
    http://checkip.dyndns.org/
    TF-24098-001.exe
    Remote address:
    193.122.130.0:80
    Request
    GET / HTTP/1.1
    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
    Host: checkip.dyndns.org
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Date: Sun, 26 Nov 2023 16:51:26 GMT
    Content-Type: text/html
    Content-Length: 104
    Connection: keep-alive
    Cache-Control: no-cache
    Pragma: no-cache
  • 132.226.247.73:80
    checkip.dyndns.org
    TF-24098-001.exe
    152 B
    3
  • 158.101.44.242:80
    checkip.dyndns.org
    TF-24098-001.exe
    152 B
    3
  • 193.122.6.168:80
    checkip.dyndns.org
    TF-24098-001.exe
    152 B
    3
  • 193.122.130.0:80
    http://checkip.dyndns.org/
    http
    TF-24098-001.exe
    335 B
    405 B
    4
    3

    HTTP Request

    GET http://checkip.dyndns.org/

    HTTP Response

    200
  • 8.8.8.8:53
    checkip.dyndns.org
    dns
    TF-24098-001.exe
    64 B
    176 B
    1
    1

    DNS Request

    checkip.dyndns.org

    DNS Response

    132.226.247.73
    158.101.44.242
    193.122.6.168
    193.122.130.0
    132.226.8.169

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2472-0-0x00000000010B0000-0x0000000001136000-memory.dmp

    Filesize

    536KB

  • memory/2472-1-0x0000000074370000-0x0000000074A5E000-memory.dmp

    Filesize

    6.9MB

  • memory/2472-2-0x0000000004E00000-0x0000000004E40000-memory.dmp

    Filesize

    256KB

  • memory/2472-3-0x0000000000360000-0x0000000000376000-memory.dmp

    Filesize

    88KB

  • memory/2472-4-0x00000000003A0000-0x00000000003AA000-memory.dmp

    Filesize

    40KB

  • memory/2472-5-0x00000000048F0000-0x0000000004950000-memory.dmp

    Filesize

    384KB

  • memory/2472-6-0x0000000074370000-0x0000000074A5E000-memory.dmp

    Filesize

    6.9MB

  • memory/2472-7-0x0000000000470000-0x0000000000494000-memory.dmp

    Filesize

    144KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.