Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
438s -
max time network
1164s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/02/2024, 01:36
General
-
Target
NoteBook Vitax.exe
-
Size
303KB
-
MD5
13de7fe5ae3ca94916e9a2388331ec5b
-
SHA1
e5650b323a754a49a4c44d966513263224af48ce
-
SHA256
8ff779c61ce341d779d71c4d907627b0a0fd33474ac6f5647fcb4484940a810b
-
SHA512
1f7b8946c4d9aed25730dd9952cecb85ea960ca76e39b04d3589f01f44fa522b59af6a26d96821c481b2ce4d96c1f3753835ffdf1a94ec3406444c2331a96563
-
SSDEEP
6144:kr+UT6MDdbICydeBwtgGJSTZsgPvur8mI1D0k2w:krNsgGJSdsrq1Duw
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1192867889502490784/d5b-GoiYJ0-udNuzCNlHbe17U050Uovs3ONP72ifR0EsXXp5DkvWjQWgRI59ylud8K6j
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 freegeoip.app 2 freegeoip.app -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 3020 NoteBook Vitax.exe 3020 NoteBook Vitax.exe 3020 NoteBook Vitax.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3020 NoteBook Vitax.exe Token: SeDebugPrivilege 3116 taskmgr.exe Token: SeSystemProfilePrivilege 3116 taskmgr.exe Token: SeCreateGlobalPrivilege 3116 taskmgr.exe Token: 33 3116 taskmgr.exe Token: SeIncBasePriorityPrivilege 3116 taskmgr.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe -
Suspicious use of SendNotifyMessage 38 IoCs
pid Process 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NoteBook Vitax.exe"C:\Users\Admin\AppData\Local\Temp\NoteBook Vitax.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:1792
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3116