Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 01:22
Static task
static1
Behavioral task
behavioral1
Sample
5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe
Resource
win10v2004-20240802-en
General
-
Target
5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe
-
Size
1.3MB
-
MD5
c087116b5a47a54e5dd272162fd87b3b
-
SHA1
71eb7a31ed81367c95563f6d4aadfb6ea028b997
-
SHA256
5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0
-
SHA512
fecdfc372ccebe22830e31a8d20050ca7a3e1b87ed1a0876df471d20aedac1e3283af624b470a20ef024f6283583629a44716197f341dcc263504de4d19e01c4
-
SSDEEP
24576:pRmJkcoQricOIQxiZY1iaJ0eud6LfL5vSjUBMF94Z9M5:mJZoQrbTFZY1iaJ0eudejk+k9eC
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
Password: )NYyffR0 - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 1 IoCs
pid Process 1404 name.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 checkip.dyndns.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000700000002342f-5.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1404 set thread context of 4872 1404 name.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3000 4872 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4872 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1404 name.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4872 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 540 5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe 540 5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe 1404 name.exe 1404 name.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 540 5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe 540 5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe 1404 name.exe 1404 name.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 540 wrote to memory of 1404 540 5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe 82 PID 540 wrote to memory of 1404 540 5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe 82 PID 540 wrote to memory of 1404 540 5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe 82 PID 1404 wrote to memory of 4872 1404 name.exe 83 PID 1404 wrote to memory of 4872 1404 name.exe 83 PID 1404 wrote to memory of 4872 1404 name.exe 83 PID 1404 wrote to memory of 4872 1404 name.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe"C:\Users\Admin\AppData\Local\Temp\5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\5988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 14524⤵
- Program crash
PID:3000
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4872 -ip 48721⤵PID:4368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5c087116b5a47a54e5dd272162fd87b3b
SHA171eb7a31ed81367c95563f6d4aadfb6ea028b997
SHA2565988ba6bf97c1b33f469edfca96b98c35d2054f2ce49d8e065d23250a241a3d0
SHA512fecdfc372ccebe22830e31a8d20050ca7a3e1b87ed1a0876df471d20aedac1e3283af624b470a20ef024f6283583629a44716197f341dcc263504de4d19e01c4