Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    43s
  • max time network
    109s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16/09/2024, 21:13

General

  • Target

    bb64f5d78d45a7994988a5aea5c5fd06aa9be2106d38be875e3e7041d58a994aN.exe

  • Size

    1.1MB

  • MD5

    d19e57cc9fadabb7d0b4d5f29afaab80

  • SHA1

    f0678c2796dbf40a30fcc4e9d2455641bd83866d

  • SHA256

    bb64f5d78d45a7994988a5aea5c5fd06aa9be2106d38be875e3e7041d58a994a

  • SHA512

    3f91e041a19d0316296244e58f04108cca4357e3b28785425fa24b3b9d5ce3b2ab26c2445c20b9719d9acd7920481c2a19597897fd6a69894f5cac58526b8c7a

  • SSDEEP

    24576:sqDEvCTbMWu7rQYlBQcBiT6rprG8a+gLAAB8CeF:sTvC/MTQYxsWR7a+gLAAte

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7505197168:AAH44rUOfgM2A0VfpI637HSQjCH00DQZX48/sendMessage?chat_id=875935923

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 33 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb64f5d78d45a7994988a5aea5c5fd06aa9be2106d38be875e3e7041d58a994aN.exe
    "C:\Users\Admin\AppData\Local\Temp\bb64f5d78d45a7994988a5aea5c5fd06aa9be2106d38be875e3e7041d58a994aN.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1568
    • C:\Users\Admin\AppData\Local\directory\name.exe
      "C:\Users\Admin\AppData\Local\Temp\bb64f5d78d45a7994988a5aea5c5fd06aa9be2106d38be875e3e7041d58a994aN.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1808
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Users\Admin\AppData\Local\Temp\bb64f5d78d45a7994988a5aea5c5fd06aa9be2106d38be875e3e7041d58a994aN.exe"
        3⤵
          PID:2384
        • C:\Users\Admin\AppData\Local\directory\name.exe
          "C:\Users\Admin\AppData\Local\directory\name.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:936
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Users\Admin\AppData\Local\directory\name.exe"
            4⤵
            • Accesses Microsoft Outlook profiles
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:1792

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Montevideo

      Filesize

      140KB

      MD5

      91da3c3d3cd9fd67bbbd17db9c57467c

      SHA1

      0ffe669c2c984050f576c076cc27091583eb6686

      SHA256

      d5d27e7780a26378292416db6dbcc4a4da9b1045cb439390f8d16ac16fd64882

      SHA512

      dc833d12d727132f11a6bff5036fa07eb1a61f72a7441c3d050889022fdeaef9d7ec5b270bcf28aa5a1fcbf3625f0c5689e0ad5aca211227fdb7241235d127ed

    • C:\Users\Admin\AppData\Local\Temp\aut2240.tmp

      Filesize

      220KB

      MD5

      075149402cd417805cabacc1f6115a08

      SHA1

      b11f6ccf9060deb2cc1537faa35220655402c29c

      SHA256

      d8ffa9ec8b43ca64169281c35fcd2fcff79092e7d85b6a1b484987625fbdca7f

      SHA512

      161af7724127b177e18a829f0a52e5a626530674d710d372ff883751f51e63e1f49b2e1c8d445194259790966e1f1b137ca21d43ed71e15b3eb686f20c0e5784

    • C:\Users\Admin\AppData\Local\Temp\aut2251.tmp

      Filesize

      14KB

      MD5

      7c9b7aea53440859ee01318eac3c0376

      SHA1

      6ee7b5f02a4e27d30099709c6f68e7a1528cf4b9

      SHA256

      7a0a6218e77d4a6c01a9a12b13c99739474c8f0a93cc0cfee0bddabe21bf8ea3

      SHA512

      2d6ee94c1c8103e500cf296f63afe8e5485b73a672451ed487082bbaf7312cb5adb4ba01921deadff48128c0ecd709301e9a34c52f4bdc707cda086d192ac4f4

    • C:\Users\Admin\AppData\Local\Temp\carryover

      Filesize

      225KB

      MD5

      16744b21d6e5f442a008b478e11b7b1e

      SHA1

      8a4ce9c967effbfda3c505d43d0d2ebe68de9fe2

      SHA256

      dfd48f30102a5244181c0bd462771ffcb4ad652a342aa019a5d021b71fda1f1a

      SHA512

      3bcee61f1237419b8964f98965672595b10d57eb8d0dcc3b7941adba3f629d9e1818452380260bd1d5ff33ec34550efdafe3798880e95ff3c66be495e6973d1a

    • \Users\Admin\AppData\Local\directory\name.exe

      Filesize

      1.1MB

      MD5

      d19e57cc9fadabb7d0b4d5f29afaab80

      SHA1

      f0678c2796dbf40a30fcc4e9d2455641bd83866d

      SHA256

      bb64f5d78d45a7994988a5aea5c5fd06aa9be2106d38be875e3e7041d58a994a

      SHA512

      3f91e041a19d0316296244e58f04108cca4357e3b28785425fa24b3b9d5ce3b2ab26c2445c20b9719d9acd7920481c2a19597897fd6a69894f5cac58526b8c7a

    • memory/1568-10-0x0000000000160000-0x0000000000164000-memory.dmp

      Filesize

      16KB

    • memory/1792-44-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/1792-46-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/1792-47-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/1792-48-0x000000007469E000-0x000000007469F000-memory.dmp

      Filesize

      4KB

    • memory/1792-49-0x00000000003B0000-0x00000000003EA000-memory.dmp

      Filesize

      232KB

    • memory/1792-50-0x0000000074690000-0x0000000074D7E000-memory.dmp

      Filesize

      6.9MB

    • memory/1792-51-0x0000000074690000-0x0000000074D7E000-memory.dmp

      Filesize

      6.9MB

    • memory/1792-52-0x0000000000450000-0x0000000000488000-memory.dmp

      Filesize

      224KB

    • memory/1792-62-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-56-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-64-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-68-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-70-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-76-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-74-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-72-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-60-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-58-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-66-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-54-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-53-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-79-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-86-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-112-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-111-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-108-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-106-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-105-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-102-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-100-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-98-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-97-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-94-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-93-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-90-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-88-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-84-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-82-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-80-0x0000000000450000-0x0000000000483000-memory.dmp

      Filesize

      204KB

    • memory/1792-655-0x0000000074690000-0x0000000074D7E000-memory.dmp

      Filesize

      6.9MB

    • memory/1792-656-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/1792-657-0x000000007469E000-0x000000007469F000-memory.dmp

      Filesize

      4KB

    • memory/1792-658-0x0000000074690000-0x0000000074D7E000-memory.dmp

      Filesize

      6.9MB

    • memory/1792-659-0x0000000074690000-0x0000000074D7E000-memory.dmp

      Filesize

      6.9MB

    • memory/1792-660-0x0000000074690000-0x0000000074D7E000-memory.dmp

      Filesize

      6.9MB