Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 01:51
Behavioral task
behavioral1
Sample
cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe
Resource
win10v2004-20240802-en
General
-
Target
cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe
-
Size
74KB
-
MD5
4fb681131f7ac7824c4f0afd337986d9
-
SHA1
c746978c6c091d94f2bbd17b1ad5954c4306bece
-
SHA256
cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80
-
SHA512
b5c2c3f6b5fe4845c0462059d9177b0cf56a36fe528745a9ea7f27120fdf2184b44be4dc5195d9e0d98a5a5987b8bc212707b3b4cc5ada9203db61f9859f3868
-
SSDEEP
1536:EUo0cxhzjBCViPMVXOS0GIkH1b6/20AuQQzcqLVclN:EUlcxhzVCiPMVOkH1b6+/QbBY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
100 RND
91.92.243.191:5401
6871a79e-e4f7-4fb3-ae38-dc20c1d657a0
-
delay
1
-
install
true
-
install_file
hyperhostvc.exe
-
install_folder
%AppData%
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/1500-18-0x000000001C710000-0x000000001C832000-memory.dmp family_stormkitty -
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000d0000000006c3-11.dat family_asyncrat -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe -
Executes dropped EXE 1 IoCs
pid Process 1500 hyperhostvc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 hyperhostvc.exe Key opened \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 hyperhostvc.exe Key opened \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 hyperhostvc.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 29 discord.com 30 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 icanhazip.com 22 ip-api.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 1544 cmd.exe 184 netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 hyperhostvc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier hyperhostvc.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3108 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4912 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe 1500 hyperhostvc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe Token: SeDebugPrivilege 1500 hyperhostvc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1500 hyperhostvc.exe 1500 hyperhostvc.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4832 wrote to memory of 4592 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 88 PID 4832 wrote to memory of 4592 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 88 PID 4832 wrote to memory of 2892 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 90 PID 4832 wrote to memory of 2892 4832 cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe 90 PID 2892 wrote to memory of 3108 2892 cmd.exe 93 PID 2892 wrote to memory of 3108 2892 cmd.exe 93 PID 4592 wrote to memory of 4912 4592 cmd.exe 92 PID 4592 wrote to memory of 4912 4592 cmd.exe 92 PID 2892 wrote to memory of 1500 2892 cmd.exe 94 PID 2892 wrote to memory of 1500 2892 cmd.exe 94 PID 1500 wrote to memory of 1544 1500 hyperhostvc.exe 96 PID 1500 wrote to memory of 1544 1500 hyperhostvc.exe 96 PID 1544 wrote to memory of 3780 1544 cmd.exe 98 PID 1544 wrote to memory of 3780 1544 cmd.exe 98 PID 1544 wrote to memory of 184 1544 cmd.exe 99 PID 1544 wrote to memory of 184 1544 cmd.exe 99 PID 1544 wrote to memory of 4884 1544 cmd.exe 100 PID 1544 wrote to memory of 4884 1544 cmd.exe 100 PID 1500 wrote to memory of 2284 1500 hyperhostvc.exe 101 PID 1500 wrote to memory of 2284 1500 hyperhostvc.exe 101 PID 2284 wrote to memory of 2792 2284 cmd.exe 103 PID 2284 wrote to memory of 2792 2284 cmd.exe 103 PID 2284 wrote to memory of 1692 2284 cmd.exe 104 PID 2284 wrote to memory of 1692 2284 cmd.exe 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 hyperhostvc.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 hyperhostvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe"C:\Users\Admin\AppData\Local\Temp\cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "hyperhostvc" /tr '"C:\Users\Admin\AppData\Roaming\hyperhostvc.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "hyperhostvc" /tr '"C:\Users\Admin\AppData\Roaming\hyperhostvc.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:4912
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpBF29.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3108
-
-
C:\Users\Admin\AppData\Roaming\hyperhostvc.exe"C:\Users\Admin\AppData\Roaming\hyperhostvc.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1500 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All4⤵
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:3780
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:184
-
-
C:\Windows\system32\findstr.exefindstr All5⤵PID:4884
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid4⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:2792
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid5⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1692
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\1af02931f6a427a6b6e36285307150c0\Admin@KZYBFHMK_en-US\System\Process.txt
Filesize2KB
MD5ebeb8fb113b4cbe780d05f579802bdf4
SHA17c532462cfca2934c9d489ae53475f3efc1162f6
SHA25623bd08d99ec3984f89378acf2cf2579249c4e6fc4651dd0c2c25ceaf3455daa6
SHA512a89590265976b6c2c3ea8dfaa4dc1f2463813883db4cd6b58d06bdc0b43feae8a969048ee91b8575b10f41020846aada4e5620b8c39437be3e863e01f3349f3c
-
C:\Users\Admin\AppData\Local\1af02931f6a427a6b6e36285307150c0\Admin@KZYBFHMK_en-US\System\Process.txt
Filesize3KB
MD5aa8e8d91895bedd68ebd92e4fdba98d7
SHA1754d5d4e8703a879bb34fdc5a6f87cc20a5da645
SHA256a4e7cfe08c6950f8969f420b357fb3b1fca768ee1d6cc496149396694f819f63
SHA512f173c9b1bbd5a09cc8ca798617b9e4eb9c8a5980518fbd7d39d17fe1d6a8d04f4530645af45f30f4e9005b2d3959d59f3878f846ee759a64c26922518e1d24ff
-
C:\Users\Admin\AppData\Local\1af02931f6a427a6b6e36285307150c0\Admin@KZYBFHMK_en-US\System\Process.txt
Filesize4KB
MD5719fa8eea008b806bf52187d774cfeff
SHA1d013e5bd87b59abd66b1274ceb2ac0f91f589eba
SHA256d8a88fd2d2117cdcb4997adb3b42bed0a80b26d79d7cdef96fac7712bf6f4d2b
SHA51241f09541a4e71f3e3573a8c83859f5b0659877e3c02d4bc24e4a6efded6c666f4ce3c459c51466fcc1adf7cc89c7379645500a62956ce9bab7842f88bc79ffd7
-
C:\Users\Admin\AppData\Local\1af02931f6a427a6b6e36285307150c0\Admin@KZYBFHMK_en-US\System\Process.txt
Filesize808B
MD5a6eb6a2f38594d3347ac508e6cf78eea
SHA12a57dd9b23388fea70b6ca62c7207c7babba8093
SHA256443a0906bbdc54fa750a24e97be7b6c645eebc18d0924e7efb2a5a72b157893c
SHA5129ebbe2f92e9864b98891ae4446f97d15c0dcd3a15b2a8e6fc5393cd5cf71843169bf42caf0de504882bb7361592c104974d86312525c853c68afbcf080d7f411
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
155B
MD552c89728e34c5a114312669b798fd3a3
SHA16dd57e3ab4537821fe6fff9f3f8b3f90c1792d16
SHA2560d524331eeafe166fbdedc25680466ac1c92efe860d06eb425a95e0076dfaab6
SHA5129a86068cda179d9179da400682e5d6fe448cba811851050fc914d3882bc37f11eeaf64f231357d11407857f6c28618f33b0de83a86dfae4ddb6a4022adc8989d
-
Filesize
114KB
MD5242b4242b3c1119f1fb55afbbdd24105
SHA1e1d9c1ed860b67b926fe18206038cd10f77b9c55
SHA2562d0e57c642cc32f10e77a73015075c2d03276dd58689944b01139b2bde8a62a1
SHA5127d1e08dc0cf5e241bcfe3be058a7879b530646726c018bc51cc4821a7a41121bcda6fbfdeeca563e3b6b5e7035bdd717781169c3fdbd2c74933390aa9450c684
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
74KB
MD54fb681131f7ac7824c4f0afd337986d9
SHA1c746978c6c091d94f2bbd17b1ad5954c4306bece
SHA256cc38fb3ee3227606258b1b9ccba885393d6ed4a54a51aefef30a669cdc171e80
SHA512b5c2c3f6b5fe4845c0462059d9177b0cf56a36fe528745a9ea7f27120fdf2184b44be4dc5195d9e0d98a5a5987b8bc212707b3b4cc5ada9203db61f9859f3868