Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10SMS sender...7z.dll
windows7-x64
1SMS sender...7z.dll
windows10-2004-x64
1SMS sender...7z.exe
windows7-x64
1SMS sender...7z.exe
windows10-2004-x64
1SMS sender...to.dll
windows7-x64
1SMS sender...to.dll
windows10-2004-x64
1SMS sender...ox.dll
windows7-x64
1SMS sender...ox.dll
windows10-2004-x64
1SMS sender...er.bat
windows7-x64
5SMS sender...er.bat
windows10-2004-x64
5SMS sender...or.dll
windows7-x64
1SMS sender...or.dll
windows10-2004-x64
1SMS sender...es.dll
windows7-x64
1SMS sender...es.dll
windows10-2004-x64
1SMS sender...23.exe
windows7-x64
10SMS sender...23.exe
windows10-2004-x64
10SMS sender...UI.dll
windows7-x64
1SMS sender...UI.dll
windows10-2004-x64
1SMS sender...UI.dll
windows7-x64
1SMS sender...UI.dll
windows10-2004-x64
1SMS sender...ip.dll
windows7-x64
1SMS sender...ip.dll
windows10-2004-x64
1SMS sender...ub.exe
windows7-x64
10SMS sender...ub.exe
windows10-2004-x64
10SMS sender...te.dll
windows7-x64
1SMS sender...te.dll
windows10-2004-x64
1SMS sender...lt.dll
windows7-x64
1SMS sender...lt.dll
windows10-2004-x64
1SMS sender...Ip.dll
windows7-x64
1SMS sender...Ip.dll
windows10-2004-x64
1SMS sender...ib.dll
windows7-x64
1SMS sender...ib.dll
windows10-2004-x64
1Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 15:59
Behavioral task
behavioral1
Sample
SMS sender 2023/SMS sender 2023/7z.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
SMS sender 2023/SMS sender 2023/7z.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
SMS sender 2023/SMS sender 2023/7z.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
SMS sender 2023/SMS sender 2023/7z.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
SMS sender 2023/SMS sender 2023/BouncyCastle.Crypto.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
SMS sender 2023/SMS sender 2023/BouncyCastle.Crypto.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
SMS sender 2023/SMS sender 2023/FastColoredTextBox.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
SMS sender 2023/SMS sender 2023/FastColoredTextBox.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
SMS sender 2023/SMS sender 2023/Fixer.bat
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
SMS sender 2023/SMS sender 2023/Fixer.bat
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
SMS sender 2023/SMS sender 2023/IconExtractor.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
SMS sender 2023/SMS sender 2023/IconExtractor.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
SMS sender 2023/SMS sender 2023/InstallResources.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
SMS sender 2023/SMS sender 2023/InstallResources.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
SMS sender 2023/SMS sender 2023/SMS sender 2023.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
SMS sender 2023/SMS sender 2023/SMS sender 2023.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
SMS sender 2023/SMS sender 2023/Siticone.Desktop.UI.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
SMS sender 2023/SMS sender 2023/Siticone.Desktop.UI.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
SMS sender 2023/SMS sender 2023/Siticone.UI.dll
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
SMS sender 2023/SMS sender 2023/Siticone.UI.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
SMS sender 2023/SMS sender 2023/Stub/DotNetZip.dll
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
SMS sender 2023/SMS sender 2023/Stub/DotNetZip.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
SMS sender 2023/SMS sender 2023/Stub/Stub.exe
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
SMS sender 2023/SMS sender 2023/Stub/Stub.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
SMS sender 2023/SMS sender 2023/System.Data.SQLite.dll
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
SMS sender 2023/SMS sender 2023/System.Data.SQLite.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
SMS sender 2023/SMS sender 2023/ToolBelt.dll
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
SMS sender 2023/SMS sender 2023/ToolBelt.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
SMS sender 2023/SMS sender 2023/cGeoIp.dll
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
SMS sender 2023/SMS sender 2023/cGeoIp.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
SMS sender 2023/SMS sender 2023/dnlib.dll
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
SMS sender 2023/SMS sender 2023/dnlib.dll
Resource
win10v2004-20231215-en
General
-
Target
SMS sender 2023/SMS sender 2023/SMS sender 2023.exe
-
Size
226KB
-
MD5
24dd26630b048cde008c05f926175a9b
-
SHA1
0b96f1ebd9b1be405c6e69aecb266089cd406ea7
-
SHA256
dba3b96b00b793eeccc62c2f973034a8813e6449f76a4dfdc9a2b0c38936b32f
-
SHA512
a869a5a768577552ed5fdd0f1957462d743254ec48ee75f6cfbd36a570c41e1b7c4f0f59eed5e6300ba100a958f4c883aa72d631e4b56a51596d395269c58eeb
-
SSDEEP
3072:N+STW8djpN6izj8mZw2g7uB1NUbBYp2TCnazbZHPzpq/Vp+8E89Fk6+Wp0:S8XN6W8mm2bnUbK2qazbZHl+F
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral16/memory/4312-0-0x0000000000020000-0x000000000005E000-memory.dmp family_stormkitty -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 8 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\e60b0c7d9e6c8ba07f05443643ed3624\Admin@VFMDDVWB_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini SMS sender 2023.exe File opened for modification C:\Users\Admin\AppData\Local\e60b0c7d9e6c8ba07f05443643ed3624\Admin@VFMDDVWB_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini SMS sender 2023.exe File opened for modification C:\Users\Admin\AppData\Local\e60b0c7d9e6c8ba07f05443643ed3624\Admin@VFMDDVWB_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini SMS sender 2023.exe File created C:\Users\Admin\AppData\Local\e60b0c7d9e6c8ba07f05443643ed3624\Admin@VFMDDVWB_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini SMS sender 2023.exe File created C:\Users\Admin\AppData\Local\e60b0c7d9e6c8ba07f05443643ed3624\Admin@VFMDDVWB_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini SMS sender 2023.exe File created C:\Users\Admin\AppData\Local\e60b0c7d9e6c8ba07f05443643ed3624\Admin@VFMDDVWB_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini SMS sender 2023.exe File created C:\Users\Admin\AppData\Local\e60b0c7d9e6c8ba07f05443643ed3624\Admin@VFMDDVWB_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini SMS sender 2023.exe File created C:\Users\Admin\AppData\Local\e60b0c7d9e6c8ba07f05443643ed3624\Admin@VFMDDVWB_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini SMS sender 2023.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 SMS sender 2023.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier SMS sender 2023.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 4312 SMS sender 2023.exe 4312 SMS sender 2023.exe 4312 SMS sender 2023.exe 4312 SMS sender 2023.exe 4312 SMS sender 2023.exe 4312 SMS sender 2023.exe 4312 SMS sender 2023.exe 4312 SMS sender 2023.exe 4312 SMS sender 2023.exe 4312 SMS sender 2023.exe 4312 SMS sender 2023.exe 4312 SMS sender 2023.exe 4312 SMS sender 2023.exe 4312 SMS sender 2023.exe 4312 SMS sender 2023.exe 4312 SMS sender 2023.exe 4312 SMS sender 2023.exe 4312 SMS sender 2023.exe 4312 SMS sender 2023.exe 4312 SMS sender 2023.exe 4312 SMS sender 2023.exe 4312 SMS sender 2023.exe 4312 SMS sender 2023.exe 4312 SMS sender 2023.exe 4312 SMS sender 2023.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4312 SMS sender 2023.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4312 wrote to memory of 752 4312 SMS sender 2023.exe 90 PID 4312 wrote to memory of 752 4312 SMS sender 2023.exe 90 PID 4312 wrote to memory of 752 4312 SMS sender 2023.exe 90 PID 752 wrote to memory of 3260 752 cmd.exe 92 PID 752 wrote to memory of 3260 752 cmd.exe 92 PID 752 wrote to memory of 3260 752 cmd.exe 92 PID 752 wrote to memory of 3172 752 cmd.exe 93 PID 752 wrote to memory of 3172 752 cmd.exe 93 PID 752 wrote to memory of 3172 752 cmd.exe 93 PID 752 wrote to memory of 1192 752 cmd.exe 94 PID 752 wrote to memory of 1192 752 cmd.exe 94 PID 752 wrote to memory of 1192 752 cmd.exe 94 PID 4312 wrote to memory of 3928 4312 SMS sender 2023.exe 95 PID 4312 wrote to memory of 3928 4312 SMS sender 2023.exe 95 PID 4312 wrote to memory of 3928 4312 SMS sender 2023.exe 95 PID 3928 wrote to memory of 3536 3928 cmd.exe 97 PID 3928 wrote to memory of 3536 3928 cmd.exe 97 PID 3928 wrote to memory of 3536 3928 cmd.exe 97 PID 3928 wrote to memory of 3996 3928 cmd.exe 98 PID 3928 wrote to memory of 3996 3928 cmd.exe 98 PID 3928 wrote to memory of 3996 3928 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\SMS sender 2023\SMS sender 2023\SMS sender 2023.exe"C:\Users\Admin\AppData\Local\Temp\SMS sender 2023\SMS sender 2023\SMS sender 2023.exe"1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:3260
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile3⤵PID:3172
-
-
C:\Windows\SysWOW64\findstr.exefindstr All3⤵PID:1192
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:3536
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid3⤵PID:3996
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD5ee0e95249268b86ff2053bef214bfeda
SHA1b49a202cd695007ac4a3749862f273f2e5dde766
SHA256b35b03ac338d2ad7aefa7f39e2ccf16264f65654ea1aed633e0f2bbcbab1a7ad
SHA512daf13e8aa62c46d3a4d8f715ea2cb6598ea456ba7cd4c2bd154a684477f4749765a6073bd1abe5a48a3f1b7d6da3302e086e4fcb893914c6b15b40fe93128ae8
-
C:\Users\Admin\AppData\Local\e60b0c7d9e6c8ba07f05443643ed3624\Admin@VFMDDVWB_en-US\System\Process.txt
Filesize4KB
MD512692ede1dfb08323f6c81fe06689793
SHA1251de10eba3cfec6c487f06a1ba038272692bfd0
SHA2565b38622974fd59df71aff41dbffa78dfc31d5581fda74b37cfd381bfadda2cd6
SHA5123ed4bb61bc8eaf0222459292e5bc70229da3ec78589087f200e4f3e4f619d2aa0755c67174475d8f4700ba249204d82c4072ca023c3909ef62e4197047b81d81