Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 01:22
Static task
static1
Behavioral task
behavioral1
Sample
5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe
Resource
win10v2004-20240802-en
General
-
Target
5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe
-
Size
1.3MB
-
MD5
c087116b5a47a54e5dd272162fd87b3b
-
SHA1
71eb7a31ed81367c95563f6d4aadfb6ea028b997
-
SHA256
5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0
-
SHA512
fecdfc372ccebe22830e31a8d20050ca7a3e1b87ed1a0876df471d20aedac1e3283af624b470a20ef024f6283583629a44716197f341dcc263504de4d19e01c4
-
SSDEEP
24576:pRmJkcoQricOIQxiZY1iaJ0eud6LfL5vSjUBMF94Z9M5:mJZoQrbTFZY1iaJ0eudejk+k9eC
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
Password: )NYyffR0 - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 1 IoCs
pid Process 3036 name.exe -
Loads dropped DLL 1 IoCs
pid Process 632 5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000016d0c-4.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3036 set thread context of 2384 3036 name.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2832 2384 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2384 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3036 name.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2384 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 632 5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe 632 5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe 3036 name.exe 3036 name.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 632 5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe 632 5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe 3036 name.exe 3036 name.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 632 wrote to memory of 3036 632 5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe 30 PID 632 wrote to memory of 3036 632 5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe 30 PID 632 wrote to memory of 3036 632 5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe 30 PID 632 wrote to memory of 3036 632 5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe 30 PID 3036 wrote to memory of 2384 3036 name.exe 31 PID 3036 wrote to memory of 2384 3036 name.exe 31 PID 3036 wrote to memory of 2384 3036 name.exe 31 PID 3036 wrote to memory of 2384 3036 name.exe 31 PID 3036 wrote to memory of 2384 3036 name.exe 31 PID 3036 wrote to memory of 2384 3036 name.exe 31 PID 3036 wrote to memory of 2384 3036 name.exe 31 PID 3036 wrote to memory of 2384 3036 name.exe 31 PID 2384 wrote to memory of 2832 2384 RegSvcs.exe 32 PID 2384 wrote to memory of 2832 2384 RegSvcs.exe 32 PID 2384 wrote to memory of 2832 2384 RegSvcs.exe 32 PID 2384 wrote to memory of 2832 2384 RegSvcs.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe"C:\Users\Admin\AppData\Local\Temp\5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 10724⤵
- Program crash
PID:2832
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5c087116b5a47a54e5dd272162fd87b3b
SHA171eb7a31ed81367c95563f6d4aadfb6ea028b997
SHA2565988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0
SHA512fecdfc372ccebe22830e31a8d20050ca7a3e1b87ed1a0876df471d20aedac1e3283af624b470a20ef024f6283583629a44716197f341dcc263504de4d19e01c4