Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 22:43
Behavioral task
behavioral1
Sample
5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe
Resource
win10v2004-20240802-en
General
-
Target
5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe
-
Size
297KB
-
MD5
fb7bed457cb3d5be6c8b80f3105cc3d3
-
SHA1
0a60f5ca1e55b180ee0db151830c477d361aea3c
-
SHA256
5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc
-
SHA512
36d29cca7be2e416545273860e9a38d3df930d657bc39fba299dcee03138a52e5ca4292d4a5d3a4a3277582b24008c3edd225df341f81063b963ada438c7fd88
-
SSDEEP
6144:thiCNeUwAe6krgybO4Ef2z0Ysapo1y+S5ORiv:tTNeUwAr2hd0yZv
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/1164-1-0x0000000000110000-0x0000000000160000-memory.dmp family_stormkitty -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe Key opened \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe Key opened \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 4 IoCs
description ioc Process File created C:\ProgramData\SYMRKCCU\FileGrabber\Desktop\desktop.ini 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe File created C:\ProgramData\SYMRKCCU\FileGrabber\Documents\desktop.ini 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe File created C:\ProgramData\SYMRKCCU\FileGrabber\Downloads\desktop.ini 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe File created C:\ProgramData\SYMRKCCU\FileGrabber\Pictures\desktop.ini 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 freegeoip.app 8 freegeoip.app 44 api.ipify.org 45 api.ipify.org 46 ip-api.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1164 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe"C:\Users\Admin\AppData\Local\Temp\5ae9a61c6122a37eec8c250790b437a3bda7d2a3995d4cb6e106da6f900c53cc.exe"1⤵
- Accesses Microsoft Outlook profiles
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1164
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3364,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=3824 /prefetch:81⤵PID:4520
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
626KB
MD599a2f8ba7264933185c8aee369dfda15
SHA1a9520ecfb92ea89b3432a8471b92128e49ce4480
SHA256b348698fca9263c51428990503332e9a47efc9bcfc4e7aa5a45ce1c267ce3bf8
SHA51230d56c86bcfaa3e23c0f3429e9bb2832ebad9077291c3b2cf44466f57e4a97e7d55880d88ed7e7f351da008e682d36285eeaf716c632e6741ac5299c105601f5
-
Filesize
794KB
MD53c6a212347c8a065907832adb1811414
SHA12761be281a796ce6c34670d12d8d8055b9ce06dd
SHA25696f18af72d3c963e711d616f6c4ea366a39ce3cbdf330e06a2ef9fa5a8b80b54
SHA512281bf62fb35e46aa4b672810d19c5dcce4a36064b4e87d6a72fb4566ecd9c48adbdac80e231093338e1ca8026f509fcc4bd6cd3704095219caca0b1081cadb8b
-
Filesize
1.1MB
MD567de13d9586f91411aabdaa7f7c930c3
SHA14bbd4b64cca09be942f956ec637a89b4de48b084
SHA256eb5c7bee2a78bea14b48ec9bd4a86ab2fe1ae4a59f08b06999345d02008c6345
SHA51266688b48ed372ed5d78e66d257d983e6d049523f8df843c618ceda61bfb42adb3b3aa2afc6e7204cc4965e795c5aec0d4fdace9e8f6e9778757fb650c7639f77
-
Filesize
370KB
MD510c994a4ce5e6f44ccc0a5918055cedc
SHA19d0dc01ddab4d38a194148a77ffa089900dcee69
SHA2566dfccd7ecff8baf3dfe607f519797648c7db664c594948179a60d4f7b19451fa
SHA512c9b765aa646c27804eb1b28c51135529012ca893552d7bd6ba523b6e32165c836c1135c932305f0405dce239f419a67286bf1cba4337c1b6b49ed3d0e0b92a81
-
Filesize
450KB
MD52e8de8c9133d237a8a073a2fff776206
SHA130dd9bd9fff33f274317bfe84eb74cfcf72297fa
SHA2565d6b77d83e89e6e19ae655bbc7837ea0a795b1752dea0c4c1fad0b8d95c1a2c3
SHA5122c8cc52cd9373569f9ce3ced2c6bf41b95f1ad74eb6d88d52907928f9588920f45a06ad1c5e3be99647c7bed14a468c31be8e11a79439e48487e17fa23606bbe
-
Filesize
339KB
MD509efc3da0c434f38d0c324809186b0d7
SHA15dc752505dad98e723effa3727491394658c5edd
SHA2561b3f970ed052bc7afaa20f5e23a7a57eca5763ea5d9438708a57937ce83b226d
SHA51216ee2183da5d8c8914ae60cbcf47f87b8274063ff6295df612cbe11735a1de339b54306f5b2ec08c3cbcaeabcd6c5bec0c75ae85c78665e7697ab83bd9155c13
-
Filesize
367KB
MD5bcf592ea78eded349ce491523c28c40b
SHA19e38d1d744585907d75a9b61e4e26e2ec4e45887
SHA256cc40782498ac1ed02f7209a9ed4ef939419de58a3fd48d578912129c8e038d75
SHA512c77a21b766fe95dfd34e6a0fb0f0c62f3a3656b05cbeee80efb3ad9ddc5f0408b4777f53c0b5f66f32a0a227f947caeac8fa3bbc0d407700a5c025b91918a7cc
-
Filesize
844KB
MD5cb4786685752796b8e47184039d7e8b0
SHA15c3010c4d05fac6a72670d002b2fb29b1d9eea9f
SHA256cef5125b80d6966043acdf24f5fe79ab155a7e624875f3c5f34985aef4904211
SHA51296a96822324a3cc608c82d9d1f4be271f7c21978f47f51b3a6b7671593c27c7b36e64eae5034e1341d4f6709d3ad4649e0c8e89bf0ddfa73de26b0400164ece2
-
Filesize
191KB
MD5bf6bbe18caffe562c12ba028bbd4f891
SHA1fd7ab0b6d16c90e905a98591ee0cc712e557962a
SHA256acca5bb42651a543967d68a42db5fdaecf06ad117f583e7940432e714619127b
SHA51259fd383b232fbf6728f67dfb1ccd01e9459ef09909785fbaae1f93436373204e7a2fe697e492dca80806115117b8724b6d78842a06a1d69857816b1e00c78e04
-
Filesize
248KB
MD5e31cc6a064fdd714772e65052587e6f8
SHA150b96d29ecabd2d62650bb6e3fa727b15e646260
SHA25667b6f546cc152f8016e169ad00a37aabd0200ed10d37a03dd50695adc1fbc5a9
SHA512a0b1175fe0da2c61ce668d505d3897e10632284a302d9f96baca0366fe2af9d84521ca1e171e35ef8fc1e3456ec07939b2ea3e13ea15163db79d580bf7a8a78c
-
Filesize
259KB
MD5f02d4ae145c6dbe7955ed29bcf3bc85b
SHA1bb7158d8a01081093b499d7f29196da7abac931a
SHA256ab28b0899f3b1a180ee2cecc9d9b844090ee2ce024bec266b1cbd2e1f53e386c
SHA5129a8186969002fab550bfcc2e6d7132e54353ab2154d39ce7d75ac87882257728a8a6a7aba531cd5ab7800e61e028ea2ed8970776238d3512baa0bf05546ec3ee
-
Filesize
149KB
MD5d725f4ff05afbb6c0609dc0fc855daaf
SHA1f9f00396c9c3e79f91c871a2a8a377fc4d187f00
SHA256e04876417b246c3f86bce43dc4809026c339bc51e3edb4e870049ab2a452aa7c
SHA512d4b47a48d1c1b48dd0d50486b6d1dec58782a317b19cd7f6ba10e4c0dfc0edf664260fda48be67732b66dbeea87fa526eae129969ee5bf81960d28940300d448
-
Filesize
222KB
MD5931fec1b30038c40fdf4c4f54bb62b04
SHA179dc738a4b6971b3fbe9531d7ca7dac2826a6388
SHA256999d3690c1936152ee8f3af961f8e240bf013d56deb8f24284c37c04896ff410
SHA5120a6a5f01bced5b2c11296397a196944ae6c15f2da39ee55a2692b3e3234ad6b429ce15a751d14adb8d531d51c6e8cdb85999008ff77eb6317b8309b627a61615
-
Filesize
264KB
MD58f967dfb021d3b014e15c55ea61f488a
SHA1f7e2d1b5c61a87b49df84566823814a609829426
SHA2566c5d7b7284ab99a805aeb3e0d0ef6198bbf0dee2b3c913a9529a312e3ebea156
SHA512aa04dc4cc558f836f77352701aef7cf579abf8fe46153523728a7923f04c59ebebdd2cc9394ff66e8ef19a8137242101b5867347e78cb21c04d864dbb3a24250
-
Filesize
4KB
MD567a0e9a92b56fc48bfa1d1d6a046e05e
SHA1340dcc7a95818370b2c165d3b6ee6de60d18c851
SHA256e1559765cdb7af69be230dcb2bdab45c8f26f6d032942ad157c17d0489627175
SHA512cb904edafb1dd5b62a96a413d7c2e38db15fa19d3c5f368d7f9f1a97a372519c4b9cc2c927f29b5738acc362d9e9cf5928985ae0dddb0e914ab5c7ebb56c00ba