Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10SMS sender...7z.dll
windows7-x64
1SMS sender...7z.dll
windows10-2004-x64
1SMS sender...7z.exe
windows7-x64
1SMS sender...7z.exe
windows10-2004-x64
1SMS sender...to.dll
windows7-x64
1SMS sender...to.dll
windows10-2004-x64
1SMS sender...ox.dll
windows7-x64
1SMS sender...ox.dll
windows10-2004-x64
1SMS sender...er.bat
windows7-x64
5SMS sender...er.bat
windows10-2004-x64
5SMS sender...or.dll
windows7-x64
1SMS sender...or.dll
windows10-2004-x64
1SMS sender...es.dll
windows7-x64
1SMS sender...es.dll
windows10-2004-x64
1SMS sender...23.exe
windows7-x64
10SMS sender...23.exe
windows10-2004-x64
10SMS sender...UI.dll
windows7-x64
1SMS sender...UI.dll
windows10-2004-x64
1SMS sender...UI.dll
windows7-x64
1SMS sender...UI.dll
windows10-2004-x64
1SMS sender...ip.dll
windows7-x64
1SMS sender...ip.dll
windows10-2004-x64
1SMS sender...ub.exe
windows7-x64
10SMS sender...ub.exe
windows10-2004-x64
10SMS sender...te.dll
windows7-x64
1SMS sender...te.dll
windows10-2004-x64
1SMS sender...lt.dll
windows7-x64
1SMS sender...lt.dll
windows10-2004-x64
1SMS sender...Ip.dll
windows7-x64
1SMS sender...Ip.dll
windows10-2004-x64
1SMS sender...ib.dll
windows7-x64
1SMS sender...ib.dll
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/02/2024, 15:59
Behavioral task
behavioral1
Sample
SMS sender 2023/SMS sender 2023/7z.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
SMS sender 2023/SMS sender 2023/7z.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
SMS sender 2023/SMS sender 2023/7z.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
SMS sender 2023/SMS sender 2023/7z.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
SMS sender 2023/SMS sender 2023/BouncyCastle.Crypto.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
SMS sender 2023/SMS sender 2023/BouncyCastle.Crypto.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
SMS sender 2023/SMS sender 2023/FastColoredTextBox.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
SMS sender 2023/SMS sender 2023/FastColoredTextBox.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
SMS sender 2023/SMS sender 2023/Fixer.bat
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
SMS sender 2023/SMS sender 2023/Fixer.bat
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
SMS sender 2023/SMS sender 2023/IconExtractor.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
SMS sender 2023/SMS sender 2023/IconExtractor.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
SMS sender 2023/SMS sender 2023/InstallResources.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
SMS sender 2023/SMS sender 2023/InstallResources.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
SMS sender 2023/SMS sender 2023/SMS sender 2023.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
SMS sender 2023/SMS sender 2023/SMS sender 2023.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
SMS sender 2023/SMS sender 2023/Siticone.Desktop.UI.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
SMS sender 2023/SMS sender 2023/Siticone.Desktop.UI.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
SMS sender 2023/SMS sender 2023/Siticone.UI.dll
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
SMS sender 2023/SMS sender 2023/Siticone.UI.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
SMS sender 2023/SMS sender 2023/Stub/DotNetZip.dll
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
SMS sender 2023/SMS sender 2023/Stub/DotNetZip.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
SMS sender 2023/SMS sender 2023/Stub/Stub.exe
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
SMS sender 2023/SMS sender 2023/Stub/Stub.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
SMS sender 2023/SMS sender 2023/System.Data.SQLite.dll
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
SMS sender 2023/SMS sender 2023/System.Data.SQLite.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
SMS sender 2023/SMS sender 2023/ToolBelt.dll
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
SMS sender 2023/SMS sender 2023/ToolBelt.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
SMS sender 2023/SMS sender 2023/cGeoIp.dll
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
SMS sender 2023/SMS sender 2023/cGeoIp.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
SMS sender 2023/SMS sender 2023/dnlib.dll
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
SMS sender 2023/SMS sender 2023/dnlib.dll
Resource
win10v2004-20231215-en
General
-
Target
SMS sender 2023/SMS sender 2023/SMS sender 2023.exe
-
Size
226KB
-
MD5
24dd26630b048cde008c05f926175a9b
-
SHA1
0b96f1ebd9b1be405c6e69aecb266089cd406ea7
-
SHA256
dba3b96b00b793eeccc62c2f973034a8813e6449f76a4dfdc9a2b0c38936b32f
-
SHA512
a869a5a768577552ed5fdd0f1957462d743254ec48ee75f6cfbd36a570c41e1b7c4f0f59eed5e6300ba100a958f4c883aa72d631e4b56a51596d395269c58eeb
-
SSDEEP
3072:N+STW8djpN6izj8mZw2g7uB1NUbBYp2TCnazbZHPzpq/Vp+8E89Fk6+Wp0:S8XN6W8mm2bnUbK2qazbZHl+F
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral15/memory/2636-0-0x0000000000A60000-0x0000000000A9E000-memory.dmp family_stormkitty behavioral15/memory/2636-160-0x0000000000550000-0x0000000000590000-memory.dmp family_stormkitty -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\508b144df2a933c331f4f9c6de20937f\Admin@AILVMYUM_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini SMS sender 2023.exe File opened for modification C:\Users\Admin\AppData\Local\508b144df2a933c331f4f9c6de20937f\Admin@AILVMYUM_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini SMS sender 2023.exe File opened for modification C:\Users\Admin\AppData\Local\508b144df2a933c331f4f9c6de20937f\Admin@AILVMYUM_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini SMS sender 2023.exe File created C:\Users\Admin\AppData\Local\508b144df2a933c331f4f9c6de20937f\Admin@AILVMYUM_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini SMS sender 2023.exe File opened for modification C:\Users\Admin\AppData\Local\508b144df2a933c331f4f9c6de20937f\Admin@AILVMYUM_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini SMS sender 2023.exe File created C:\Users\Admin\AppData\Local\508b144df2a933c331f4f9c6de20937f\Admin@AILVMYUM_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini SMS sender 2023.exe File created C:\Users\Admin\AppData\Local\508b144df2a933c331f4f9c6de20937f\Admin@AILVMYUM_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini SMS sender 2023.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 SMS sender 2023.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier SMS sender 2023.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 SMS sender 2023.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 SMS sender 2023.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 SMS sender 2023.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 SMS sender 2023.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2636 SMS sender 2023.exe 2636 SMS sender 2023.exe 2636 SMS sender 2023.exe 2636 SMS sender 2023.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2636 SMS sender 2023.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2636 wrote to memory of 3012 2636 SMS sender 2023.exe 29 PID 2636 wrote to memory of 3012 2636 SMS sender 2023.exe 29 PID 2636 wrote to memory of 3012 2636 SMS sender 2023.exe 29 PID 2636 wrote to memory of 3012 2636 SMS sender 2023.exe 29 PID 3012 wrote to memory of 2804 3012 cmd.exe 31 PID 3012 wrote to memory of 2804 3012 cmd.exe 31 PID 3012 wrote to memory of 2804 3012 cmd.exe 31 PID 3012 wrote to memory of 2804 3012 cmd.exe 31 PID 3012 wrote to memory of 2952 3012 cmd.exe 32 PID 3012 wrote to memory of 2952 3012 cmd.exe 32 PID 3012 wrote to memory of 2952 3012 cmd.exe 32 PID 3012 wrote to memory of 2952 3012 cmd.exe 32 PID 3012 wrote to memory of 2612 3012 cmd.exe 33 PID 3012 wrote to memory of 2612 3012 cmd.exe 33 PID 3012 wrote to memory of 2612 3012 cmd.exe 33 PID 3012 wrote to memory of 2612 3012 cmd.exe 33 PID 2636 wrote to memory of 1952 2636 SMS sender 2023.exe 34 PID 2636 wrote to memory of 1952 2636 SMS sender 2023.exe 34 PID 2636 wrote to memory of 1952 2636 SMS sender 2023.exe 34 PID 2636 wrote to memory of 1952 2636 SMS sender 2023.exe 34 PID 1952 wrote to memory of 1012 1952 cmd.exe 36 PID 1952 wrote to memory of 1012 1952 cmd.exe 36 PID 1952 wrote to memory of 1012 1952 cmd.exe 36 PID 1952 wrote to memory of 1012 1952 cmd.exe 36 PID 1952 wrote to memory of 1908 1952 cmd.exe 37 PID 1952 wrote to memory of 1908 1952 cmd.exe 37 PID 1952 wrote to memory of 1908 1952 cmd.exe 37 PID 1952 wrote to memory of 1908 1952 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\SMS sender 2023\SMS sender 2023\SMS sender 2023.exe"C:\Users\Admin\AppData\Local\Temp\SMS sender 2023\SMS sender 2023\SMS sender 2023.exe"1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:2804
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile3⤵PID:2952
-
-
C:\Windows\SysWOW64\findstr.exefindstr All3⤵PID:2612
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:1012
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid3⤵PID:1908
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\508b144df2a933c331f4f9c6de20937f\Admin@AILVMYUM_en-US\Browsers\Firefox\Bookmarks.txt
Filesize105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06