Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 20:46
Static task
static1
Behavioral task
behavioral1
Sample
548a6a63ed47c3ffec35a49139a71537.exe
Resource
win7-20231215-en
General
-
Target
548a6a63ed47c3ffec35a49139a71537.exe
-
Size
13.1MB
-
MD5
548a6a63ed47c3ffec35a49139a71537
-
SHA1
efd633af58692e7189a6c3c63317c310884841c9
-
SHA256
927bd6cdc3db441da001022f2e9a4091027f857ca6b7787a2acf87766cc8d9a3
-
SHA512
a6097350d0f3df88c553e0a8b498162515754ab29e92cb3ca2b2299f62b2c5dde6c5310d7d3aef1225376fc08db8bfb6fc24600bffb39859fc872d8df25c8965
-
SSDEEP
393216:pcChW/Sh1Y8pgQBL1jpQIcaMzWz8yNb3:aV/Sh18adMzWIyh3
Malware Config
Extracted
44caliber
https://discordapp.com/api/webhooks/873463242905755648/toN0X9zZYgcbFlkZ7jCqLk4I_sGhgsbHl5HJ9jgcfMn_Sw0HRHJneP9bBZz01msNSKLJ
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 548a6a63ed47c3ffec35a49139a71537.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation MultiHack.exe -
Executes dropped EXE 3 IoCs
pid Process 4036 autoit.exe 1160 MultiHack.exe 3044 MultiHack v2.exe -
Loads dropped DLL 5 IoCs
pid Process 4036 autoit.exe 4036 autoit.exe 4036 autoit.exe 4036 autoit.exe 4036 autoit.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 56 freegeoip.app 57 freegeoip.app -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 3044 MultiHack v2.exe 3044 MultiHack v2.exe 3044 MultiHack v2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x000600000001e0ce-9.dat nsis_installer_1 behavioral2/files/0x000600000001e0ce-9.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 MultiHack v2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier MultiHack v2.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 548a6a63ed47c3ffec35a49139a71537.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1680 548a6a63ed47c3ffec35a49139a71537.exe 1680 548a6a63ed47c3ffec35a49139a71537.exe 1680 548a6a63ed47c3ffec35a49139a71537.exe 3044 MultiHack v2.exe 3044 MultiHack v2.exe 3044 MultiHack v2.exe 3044 MultiHack v2.exe 3044 MultiHack v2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1680 548a6a63ed47c3ffec35a49139a71537.exe Token: SeDebugPrivilege 3044 MultiHack v2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3044 MultiHack v2.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1680 wrote to memory of 4036 1680 548a6a63ed47c3ffec35a49139a71537.exe 91 PID 1680 wrote to memory of 4036 1680 548a6a63ed47c3ffec35a49139a71537.exe 91 PID 1680 wrote to memory of 4036 1680 548a6a63ed47c3ffec35a49139a71537.exe 91 PID 1680 wrote to memory of 1160 1680 548a6a63ed47c3ffec35a49139a71537.exe 92 PID 1680 wrote to memory of 1160 1680 548a6a63ed47c3ffec35a49139a71537.exe 92 PID 1680 wrote to memory of 1160 1680 548a6a63ed47c3ffec35a49139a71537.exe 92 PID 1160 wrote to memory of 3044 1160 MultiHack.exe 97 PID 1160 wrote to memory of 3044 1160 MultiHack.exe 97 PID 1160 wrote to memory of 3044 1160 MultiHack.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\548a6a63ed47c3ffec35a49139a71537.exe"C:\Users\Admin\AppData\Local\Temp\548a6a63ed47c3ffec35a49139a71537.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\autoit.exe"C:\Users\Admin\AppData\Local\Temp\autoit.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4036
-
-
C:\Users\Admin\AppData\Local\Temp\MultiHack.exe"C:\Users\Admin\AppData\Local\Temp\MultiHack.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\MultiHack v2.exe"C:\Users\Admin\AppData\Local\Temp\MultiHack v2.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51f6906436536060571ddfea6cb0b5e18
SHA15e8862545eaeadf03b76efbddb5b870b84b700a4
SHA256cd1fd4a7637111dcc582ebe6e9d7cd8d705f8c922cff71e36fe0bf8888117c9a
SHA512e91444d9a4a3cb793458cdc877509ce32467d85f6be97204e6012257d4f90ec6f6bb0545c8ea57447325269f3f74362bdefa67b6328bd7afffc0aad2eeb5b6e4
-
Filesize
1KB
MD5bc0b5c20126d5849e0f1ad27c5965b33
SHA136c3992d1624509271cf13eed91b99c37bfcf28e
SHA256a1676c0795f7888f9e4c8a203a788fd35779b2c49c99c817790b087c28b2dc24
SHA51232a1883d6e4c4fc5712713e6ce5ac51cbcab444a252ae37696d3ec6a3c73ffb13065c46e8d7cf362029f47901b9560456197056191551ab497e5ca2433ca93c0
-
Filesize
1.2MB
MD5f915e72fe9d0d9f8f28158077b825b38
SHA1b5db3ae9c671b2593d7288acf54189fd33f0da94
SHA256097bb99cfcbbf739f5c361673fb5efb6e5b0ea81e4efbffcd3824b5b94c38bc7
SHA51228f16a55a471563139b9d24460f1d938968938796b5efdf79c6def2a411109bfbbaef83c00881674824f9baef114ba045c25af69a65bb9173b2be25550ae0dd0
-
Filesize
1.5MB
MD5e00bd983fd36b8f59e79ecc773adb273
SHA1838b71043e090a5aa7ccfa1ce4c0d5f202cf337c
SHA2562bbd6d7fe32ce72337be76abd548def8c28fa67a72d0d7d0c1a71272a97f1e80
SHA5120a0e984f2ebd3effbc1f13b40b446e838d007d5edbf921888658588c61a2d3dd69531d4186cc258536f4080935730b2a6256e5d8db07644ef66c21647fb42a71
-
Filesize
11.7MB
MD5d50d5712566f1df16b5aea21b9e0ee24
SHA1f442aa68ec8d838625f382bcf273f5d0f66427ea
SHA256e102238100a8b97d22559065e3b19379757aeda932c36916d2c84a4178921854
SHA512f9b8d6762a8b00392519b949083d5f0a3670ed24583ed4aaa7570cbc24914e0c19933486004d8949fbee930b8f0e66b50a05e3c478c193ba269677dcd619d7d0
-
Filesize
14KB
MD5d753362649aecd60ff434adf171a4e7f
SHA13b752ad064e06e21822c8958ae22e9a6bb8cf3d0
SHA2568f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586
SHA51241bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d
-
Filesize
10KB
MD556a321bd011112ec5d8a32b2f6fd3231
SHA1df20e3a35a1636de64df5290ae5e4e7572447f78
SHA256bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1
SHA5125354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3
-
Filesize
4KB
MD5e840e7f30c85e22b09a41098ff3f3343
SHA1ad1eb7b2ba66ae87641947025736c67efbc4b9d8
SHA2566707e9e88dec460c2cf421bd2bc6a314f15717527cb60dcad2fbb7352ae711a3
SHA512ea1362c9e7ac9666d6cbfc02939a6e9c411f6aef113dc8ec898c383fc4ecf9d957c6ad8f75c33847d5da0b4427c861f0ccaf240cb1def189313de2948881dc1b
-
Filesize
700B
MD5d839997f9e018d6335982fe68fc76e1c
SHA1dc68e0f2887a094ad555db9b7a76456e3afcd6ed
SHA25611e2438f0ab95635adc3d823a5ab9625ca338577cfcfe370ddaf6b4fb9c21b65
SHA512e30e10c81d5ea63a3030019d451f2139f90519c8adcc5222b797f316b88964d1213040e758390b36b9335261931ffb514acf91249e7fc7d2a475e026895fd7ce