Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 07:07
Static task
static1
Behavioral task
behavioral1
Sample
11bdefe9463d7d9caf317514750dc6a2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11bdefe9463d7d9caf317514750dc6a2.exe
Resource
win10v2004-20231215-en
General
-
Target
11bdefe9463d7d9caf317514750dc6a2.exe
-
Size
361KB
-
MD5
11bdefe9463d7d9caf317514750dc6a2
-
SHA1
62d4f90d7fa24f9855430af2583ed7ac417c3b2f
-
SHA256
4476bbf546939c0aa04b0443d46946c54c139bbbb358b3d6111805d037fbd59f
-
SHA512
aba6060e9b334e90436acd773d126c9f640391d55761a87ea134cbc474e67df67f9ac219288e3dc056f7d72793465a59efdfe21dec7863d2bc4af85792924c9c
-
SSDEEP
6144:NKDmydY+S9m2IsM56ZyXriQtAkaY9h4JewwdhTm77IEiwJJB:SdY+kmf6Z+rjuk19KNYhTmAEiwb
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 11bdefe9463d7d9caf317514750dc6a2.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 11bdefe9463d7d9caf317514750dc6a2.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 11bdefe9463d7d9caf317514750dc6a2.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 11bdefe9463d7d9caf317514750dc6a2.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 98 whatismyip.com 102 ip-address.domaintools.com 104 ip-address.domaintools.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2612 reg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2376 11bdefe9463d7d9caf317514750dc6a2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2376 11bdefe9463d7d9caf317514750dc6a2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2376 wrote to memory of 4116 2376 11bdefe9463d7d9caf317514750dc6a2.exe 97 PID 2376 wrote to memory of 4116 2376 11bdefe9463d7d9caf317514750dc6a2.exe 97 PID 2376 wrote to memory of 4116 2376 11bdefe9463d7d9caf317514750dc6a2.exe 97 PID 4116 wrote to memory of 2612 4116 cmd.exe 99 PID 4116 wrote to memory of 2612 4116 cmd.exe 99 PID 4116 wrote to memory of 2612 4116 cmd.exe 99 -
outlook_win_path 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 11bdefe9463d7d9caf317514750dc6a2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\11bdefe9463d7d9caf317514750dc6a2.exe"C:\Users\Admin\AppData\Local\Temp\11bdefe9463d7d9caf317514750dc6a2.exe"1⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_win_path
PID:2376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:2612
-
-