Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/08/2024, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
Swift_Payment_Copy.s͏x͏l͏x͏.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Swift_Payment_Copy.s͏x͏l͏x͏.exe
Resource
win10v2004-20240802-en
General
-
Target
Swift_Payment_Copy.s͏x͏l͏x͏.exe
-
Size
2.2MB
-
MD5
5bf9c004691c7497b5e94f131ae0b40f
-
SHA1
21b9a8c455fdab04bd71c0a26e5877cfe8ddb999
-
SHA256
67285edd0d6730914d31dc4a0ffa9e7f43587a9051186beffd242b9a0621f0cf
-
SHA512
963797faf17c4078c80893640f7dc12123bdc51ebad78171e23c7f6b2599c06f361baf3dca55126d1e2fab44422c383fb3a08fcad750c5a7d766b069a6509f5d
-
SSDEEP
49152:5WiP0wV0hJ5VGx6ODJ1+qEtWX33oG1Sdhopo:dVUcBabPmo
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7326718143:AAHCoPbdl01YWgtL8Z76U43CTNQwWuaC5Lk/sendMessage?chat_id=7121607304
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral2/memory/1196-0-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 36 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2008 set thread context of 1196 2008 Swift_Payment_Copy.s͏x͏l͏x͏.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1196 jsc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1196 jsc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1196 2008 Swift_Payment_Copy.s͏x͏l͏x͏.exe 90 PID 2008 wrote to memory of 1196 2008 Swift_Payment_Copy.s͏x͏l͏x͏.exe 90 PID 2008 wrote to memory of 1196 2008 Swift_Payment_Copy.s͏x͏l͏x͏.exe 90 PID 2008 wrote to memory of 1196 2008 Swift_Payment_Copy.s͏x͏l͏x͏.exe 90 PID 2008 wrote to memory of 1196 2008 Swift_Payment_Copy.s͏x͏l͏x͏.exe 90 PID 2008 wrote to memory of 1196 2008 Swift_Payment_Copy.s͏x͏l͏x͏.exe 90 PID 2008 wrote to memory of 1196 2008 Swift_Payment_Copy.s͏x͏l͏x͏.exe 90 PID 2008 wrote to memory of 1196 2008 Swift_Payment_Copy.s͏x͏l͏x͏.exe 90 PID 1196 wrote to memory of 228 1196 jsc.exe 91 PID 1196 wrote to memory of 228 1196 jsc.exe 91 PID 1196 wrote to memory of 228 1196 jsc.exe 91 PID 228 wrote to memory of 3628 228 cmd.exe 93 PID 228 wrote to memory of 3628 228 cmd.exe 93 PID 228 wrote to memory of 3628 228 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\Swift_Payment_Copy.s͏x͏l͏x͏.exe"C:\Users\Admin\AppData\Local\Temp\Swift_Payment_Copy.s͏x͏l͏x͏.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 34⤵
- System Location Discovery: System Language Discovery
PID:3628
-
-
-