Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
239s -
max time network
288s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 10:02
Static task
static1
Behavioral task
behavioral1
Sample
409021962f521632561d4cb8b5ff2a1a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
409021962f521632561d4cb8b5ff2a1a.exe
Resource
win10v2004-20231215-en
General
-
Target
409021962f521632561d4cb8b5ff2a1a.exe
-
Size
2.9MB
-
MD5
409021962f521632561d4cb8b5ff2a1a
-
SHA1
1ce4ef8554a104087c4c70ec9946e0156f7f6fda
-
SHA256
c8f5eb62c605962a4705a52a75280589a8b26952613ad093289036b2ed404627
-
SHA512
380cd71d27a17bb237841afc2f3d7ca6d87658b8a778f2d2b595910b79ad3268e51b0000493be9d4dc79fef5bd2902a3e95982d6a194d006c487171bd70ebc29
-
SSDEEP
24576:gRmJkcoQricOIQxiZY1iamoEZ3dMo2+6mTY4E4yKTiFWH+zuwfsUNXzpdenr/gT4:VJZoQrbTFZY1iamf
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
Google.@12
Signatures
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 whatismyipaddress.com 5 whatismyipaddress.com 2 whatismyipaddress.com -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2820 set thread context of 3012 2820 409021962f521632561d4cb8b5ff2a1a.exe 27 PID 3012 set thread context of 632 3012 RegSvcs.exe 29 PID 3012 set thread context of 2064 3012 RegSvcs.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2820 409021962f521632561d4cb8b5ff2a1a.exe 2820 409021962f521632561d4cb8b5ff2a1a.exe 3012 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3012 RegSvcs.exe Token: SeDebugPrivilege 632 vbc.exe Token: SeDebugPrivilege 2064 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3012 RegSvcs.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2820 wrote to memory of 3012 2820 409021962f521632561d4cb8b5ff2a1a.exe 27 PID 2820 wrote to memory of 3012 2820 409021962f521632561d4cb8b5ff2a1a.exe 27 PID 2820 wrote to memory of 3012 2820 409021962f521632561d4cb8b5ff2a1a.exe 27 PID 2820 wrote to memory of 3012 2820 409021962f521632561d4cb8b5ff2a1a.exe 27 PID 2820 wrote to memory of 3012 2820 409021962f521632561d4cb8b5ff2a1a.exe 27 PID 2820 wrote to memory of 3012 2820 409021962f521632561d4cb8b5ff2a1a.exe 27 PID 2820 wrote to memory of 3012 2820 409021962f521632561d4cb8b5ff2a1a.exe 27 PID 2820 wrote to memory of 3012 2820 409021962f521632561d4cb8b5ff2a1a.exe 27 PID 2820 wrote to memory of 3012 2820 409021962f521632561d4cb8b5ff2a1a.exe 27 PID 2820 wrote to memory of 3012 2820 409021962f521632561d4cb8b5ff2a1a.exe 27 PID 2820 wrote to memory of 3012 2820 409021962f521632561d4cb8b5ff2a1a.exe 27 PID 2820 wrote to memory of 3012 2820 409021962f521632561d4cb8b5ff2a1a.exe 27 PID 3012 wrote to memory of 632 3012 RegSvcs.exe 29 PID 3012 wrote to memory of 632 3012 RegSvcs.exe 29 PID 3012 wrote to memory of 632 3012 RegSvcs.exe 29 PID 3012 wrote to memory of 632 3012 RegSvcs.exe 29 PID 3012 wrote to memory of 632 3012 RegSvcs.exe 29 PID 3012 wrote to memory of 632 3012 RegSvcs.exe 29 PID 3012 wrote to memory of 632 3012 RegSvcs.exe 29 PID 3012 wrote to memory of 632 3012 RegSvcs.exe 29 PID 3012 wrote to memory of 632 3012 RegSvcs.exe 29 PID 3012 wrote to memory of 632 3012 RegSvcs.exe 29 PID 3012 wrote to memory of 2064 3012 RegSvcs.exe 31 PID 3012 wrote to memory of 2064 3012 RegSvcs.exe 31 PID 3012 wrote to memory of 2064 3012 RegSvcs.exe 31 PID 3012 wrote to memory of 2064 3012 RegSvcs.exe 31 PID 3012 wrote to memory of 2064 3012 RegSvcs.exe 31 PID 3012 wrote to memory of 2064 3012 RegSvcs.exe 31 PID 3012 wrote to memory of 2064 3012 RegSvcs.exe 31 PID 3012 wrote to memory of 2064 3012 RegSvcs.exe 31 PID 3012 wrote to memory of 2064 3012 RegSvcs.exe 31 PID 3012 wrote to memory of 2064 3012 RegSvcs.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\409021962f521632561d4cb8b5ff2a1a.exe"C:\Users\Admin\AppData\Local\Temp\409021962f521632561d4cb8b5ff2a1a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"3⤵
- Accesses Microsoft Outlook accounts
- Suspicious use of AdjustPrivilegeToken
PID:632
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
400B
MD5de4e5ff058882957cf8a3b5f839a031f
SHA10b3d8279120fb5fa27efbd9eee89695aa040fc24
SHA256ef54f46b9f1e342fc12e035ae94f57c61ea4e8be4e116f0a1c6f86310f400f49
SHA512a6b0d557e9eec4e56630e5ba64495df318f4fd959fffbdcbf77831185b067906917c9117a0ecd6ac817c7860d5d831cce15820d715657d81e2d817d9fab9fb72