Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
20s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 07:35
Static task
static1
Behavioral task
behavioral1
Sample
Dekont.pdf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Dekont.pdf.exe
Resource
win10v2004-20231222-en
General
-
Target
Dekont.pdf.exe
-
Size
1006KB
-
MD5
9b37096274af2542b2e8e5460a32ad92
-
SHA1
fd1bd3fe73844de5f69dfc4b42e9f40aa4395308
-
SHA256
d5957803eb8a1c83dd84f7d08d431c9ad3a7e3c29814f8b46b805083f5b4899a
-
SHA512
2297155b35eadd6d0fcad613d954558f116c9ff660ce7470f428123a99840747056e8648d51c31b86ccd900ace9075f4888e47dd9cac8dc228f40c21e49de994
-
SSDEEP
24576:2TbBv5rUDKoU7LEoW9MZBGa6mXcqIAXiAZfzI6l:IBUUPEjKGLAXiAZz
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6889241853:AAHAa8eUBd5h6tWRG0OvgDx7o1_LKQJi-y8/sendMessage?chat_id=6367688286
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 5 IoCs
resource yara_rule behavioral1/memory/1104-58-0x00000000002D0000-0x00000000012D0000-memory.dmp family_stormkitty behavioral1/memory/1104-60-0x00000000002D0000-0x00000000012D0000-memory.dmp family_stormkitty behavioral1/memory/1104-62-0x00000000002D0000-0x00000000012D0000-memory.dmp family_stormkitty behavioral1/memory/1104-63-0x00000000002D0000-0x0000000000300000-memory.dmp family_stormkitty behavioral1/memory/1104-65-0x0000000010F70000-0x0000000010FB0000-memory.dmp family_stormkitty -
Async RAT payload 5 IoCs
resource yara_rule behavioral1/memory/1104-58-0x00000000002D0000-0x00000000012D0000-memory.dmp asyncrat behavioral1/memory/1104-60-0x00000000002D0000-0x00000000012D0000-memory.dmp asyncrat behavioral1/memory/1104-62-0x00000000002D0000-0x00000000012D0000-memory.dmp asyncrat behavioral1/memory/1104-63-0x00000000002D0000-0x0000000000300000-memory.dmp asyncrat behavioral1/memory/1104-65-0x0000000010F70000-0x0000000010FB0000-memory.dmp asyncrat -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2548 ipconfig.exe 1796 ipconfig.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2728 2144 Dekont.pdf.exe 27 PID 2144 wrote to memory of 2728 2144 Dekont.pdf.exe 27 PID 2144 wrote to memory of 2728 2144 Dekont.pdf.exe 27 PID 2144 wrote to memory of 2728 2144 Dekont.pdf.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dekont.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Dekont.pdf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\dgmc.vbe"2⤵PID:2728
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release3⤵PID:2124
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /release4⤵
- Gathers network information
PID:2548
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c innlltqdtq.exe tirru.msc3⤵PID:2128
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew3⤵PID:1268
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\innlltqdtq.exeinnlltqdtq.exe tirru.msc1⤵PID:524
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:1104
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵PID:596
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵PID:1320
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid4⤵PID:676
-
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:1304
-
-
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew1⤵
- Gathers network information
PID:1796
-
C:\Windows\SysWOW64\chcp.comchcp 650011⤵PID:2792
-
C:\Windows\SysWOW64\findstr.exefindstr All1⤵PID:1948
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile1⤵PID:1356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5223e418a5069dfcfb8d61f5b4519a123
SHA19d68dec1ac850812890321e836c9dfd207409776
SHA256dbb4a26b43ad9039c07a966522f664ff9d95511d36e35c7f8b7b233e8bbbbd84
SHA512d25d601e14ba9506c2423c2dd37770436fa894bc26d55b9bbae7bdb77846a6c96d9717f0e4605f72a6e20f327b0079aac6f0c129885e62b2ecd2412b67f13fee