Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 12:58
Static task
static1
Behavioral task
behavioral1
Sample
Launch_this(Not_exe file).bat
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Launch_this(Not_exe file).bat
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
License.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
License.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
TrixXPloit.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
TrixXPloit.exe
Resource
win10v2004-20231215-en
General
-
Target
License.exe
-
Size
223KB
-
MD5
c4a30082317aa701d555c0cb1a3345a8
-
SHA1
cd36010d6bb2c282eae20edc14b25c61bb70e28d
-
SHA256
22b3ba3c3572cab0bd553ac397e311e85bf64ac3aa1c7f315b3a5fe19d3cd3de
-
SHA512
002a050ed15c05d82cec7da4d889e25b4ed9f17355993709443f8af9ffd0a00bf2a034f2dd0c247a001ef7f1e91bee08e291f98768dcb6a89fe666562815524b
-
SSDEEP
6144:pJfzvwSFMUOCsCnOIksBNQG2Nk8NeI/qt7:LfjwSFsCsC/B8pNSl
Malware Config
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ip-api.com -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 License.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz License.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1160 License.exe 1160 License.exe 1160 License.exe 1160 License.exe 1160 License.exe 1160 License.exe 1160 License.exe 1160 License.exe 1160 License.exe 1160 License.exe 1160 License.exe 1160 License.exe 1160 License.exe 1160 License.exe 1160 License.exe 1160 License.exe 1160 License.exe 1160 License.exe 1160 License.exe 1160 License.exe 1160 License.exe 1160 License.exe 1160 License.exe 1160 License.exe 1160 License.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1160 License.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\License.exe"C:\Users\Admin\AppData\Local\Temp\License.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:3108