Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/09/2024, 01:10 UTC
Static task
static1
Behavioral task
behavioral1
Sample
184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe
Resource
win10v2004-20240802-en
General
-
Target
184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe
-
Size
985KB
-
MD5
d79e5ae8cb5e88fefe9c626ca870c1c8
-
SHA1
7381a5481f7047be4853c2cbad7fe8e51964b619
-
SHA256
184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc
-
SHA512
9ac62818b33104b0d3d5b42e0625d44dc9c734dceccf05354c45a72685cbbca5d8e13961996ada0e0931ebc1c32ef1a7521e10b96ef57c6d09daf0abf84618be
-
SSDEEP
24576:RRmJkcoQricOIQxiZY1ia7u+RhkGg9RU9:eJZoQrbTFZY1ia7ugg9RU9
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.invesxteu.info - Port:
587 - Username:
neds@invesxteu.info - Password:
rwe87$%21q
https://api.telegram.org/bot5361912293:AAGLRU8lOnvgedEVLW84nw6uJBR8KKRq6f4/sendMessage?chat_id=5103867363
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 3 IoCs
resource yara_rule behavioral1/memory/2748-3-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2748-7-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2748-5-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2788 set thread context of 2748 2788 184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2748 RegSvcs.exe 2748 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2788 184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2748 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2788 184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe 2788 184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe 2788 184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe 2788 184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe 2788 184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 2788 184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe 2788 184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe 2788 184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe 2788 184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe 2788 184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2748 2788 184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe 30 PID 2788 wrote to memory of 2748 2788 184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe 30 PID 2788 wrote to memory of 2748 2788 184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe 30 PID 2788 wrote to memory of 2748 2788 184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe 30 PID 2788 wrote to memory of 2748 2788 184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe 30 PID 2788 wrote to memory of 2748 2788 184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe 30 PID 2788 wrote to memory of 2748 2788 184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe 30 PID 2788 wrote to memory of 2748 2788 184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe"C:\Users\Admin\AppData\Local\Temp\184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\184242c7b4ac6db3091d2f2ac4cbfc80aa4306b9e2e5a2b4d258f315b6e5d4bc.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2748
-
Network
-
Remote address:8.8.8.8:53Requestcheckip.dyndns.orgIN AResponsecheckip.dyndns.orgIN CNAMEcheckip.dyndns.comcheckip.dyndns.comIN A132.226.8.169checkip.dyndns.comIN A193.122.6.168checkip.dyndns.comIN A132.226.247.73checkip.dyndns.comIN A158.101.44.242checkip.dyndns.comIN A193.122.130.0
-
Remote address:132.226.8.169:80RequestGET / HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
Host: checkip.dyndns.org
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 105
Connection: keep-alive
Cache-Control: no-cache
Pragma: no-cache
-
Remote address:132.226.8.169:80RequestGET / HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
Host: checkip.dyndns.org
ResponseHTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 105
Connection: keep-alive
Cache-Control: no-cache
Pragma: no-cache
-
Remote address:132.226.8.169:80RequestGET / HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
Host: checkip.dyndns.org
ResponseHTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 105
Connection: keep-alive
Cache-Control: no-cache
Pragma: no-cache
-
Remote address:132.226.8.169:80RequestGET / HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
Host: checkip.dyndns.org
ResponseHTTP/1.1 504 Gateway Time-out
Content-Type: text/html
Content-Length: 557
Connection: keep-alive
-
Remote address:132.226.8.169:80RequestGET / HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
Host: checkip.dyndns.org
ResponseHTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 105
Connection: keep-alive
Cache-Control: no-cache
Pragma: no-cache
-
Remote address:132.226.8.169:80RequestGET / HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
Host: checkip.dyndns.org
ResponseHTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 105
Connection: keep-alive
Cache-Control: no-cache
Pragma: no-cache
-
Remote address:132.226.8.169:80RequestGET / HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
Host: checkip.dyndns.org
ResponseHTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 105
Connection: keep-alive
Cache-Control: no-cache
Pragma: no-cache
-
Remote address:132.226.8.169:80RequestGET / HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
Host: checkip.dyndns.org
ResponseHTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 105
Connection: keep-alive
Cache-Control: no-cache
Pragma: no-cache
-
Remote address:132.226.8.169:80RequestGET / HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
Host: checkip.dyndns.org
ResponseHTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 105
Connection: keep-alive
Cache-Control: no-cache
Pragma: no-cache
-
Remote address:8.8.8.8:53Requestreallyfreegeoip.orgIN AResponsereallyfreegeoip.orgIN A104.21.67.152reallyfreegeoip.orgIN A172.67.177.134
-
Remote address:104.21.67.152:443RequestGET /xml/138.199.29.44 HTTP/1.1
Host: reallyfreegeoip.org
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: application/xml
Transfer-Encoding: chunked
Connection: keep-alive
access-control-allow-origin: *
vary: Accept-Encoding
Cache-Control: max-age=86400
CF-Cache-Status: HIT
Age: 40158
Last-Modified: Wed, 25 Sep 2024 14:01:30 GMT
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gvakdRtyRJhNrADy5IjDUsiVLeSUnvyOw8WNLGVZoyKEHEPu%2B49n%2Fo8goD9UeFNpBrn7GAs3Ndu5szeNCVQb2TVvFlB2R6cQklXXIRzbdu3vL1EgfbnHsOBLwp7aJbHsEDNk9o3L"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8c8f6058f9a3416d-LHR
alt-svc: h3=":443"; ma=86400
-
Remote address:104.21.67.152:443RequestGET /xml/138.199.29.44 HTTP/1.1
Host: reallyfreegeoip.org
ResponseHTTP/1.1 200 OK
Content-Type: application/xml
Transfer-Encoding: chunked
Connection: keep-alive
access-control-allow-origin: *
vary: Accept-Encoding
Cache-Control: max-age=86400
CF-Cache-Status: HIT
Age: 40160
Last-Modified: Wed, 25 Sep 2024 14:01:30 GMT
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2F22u7axH5UJE94eZdp%2Fo7IkuJlB6NEdkkX1rfbBD0WwyDE2pWyVPfb2Kh6BfbHgNy%2B768SaJiyanfzZl3T9%2B1wWTct0onaSbHhieNKzrwU43oLl15WIVAprWhzqAIcR4dfeC8d%2Bp"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8c8f6064b9e3416d-LHR
-
Remote address:104.21.67.152:443RequestGET /xml/138.199.29.44 HTTP/1.1
Host: reallyfreegeoip.org
ResponseHTTP/1.1 200 OK
Content-Type: application/xml
Transfer-Encoding: chunked
Connection: keep-alive
access-control-allow-origin: *
vary: Accept-Encoding
Cache-Control: max-age=86400
CF-Cache-Status: HIT
Age: 40164
Last-Modified: Wed, 25 Sep 2024 14:01:30 GMT
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=72wWnwNwCO%2BI9qas1RoYKe1IGxpuRMnRvVDlpXcqsECx13QQM5jbnbgLpsz1rHgsDJdZy%2Fl9MIHlt5U5k7i1eRuaAONUyAwSpm0Z2YRK53dX8B1ybrOL4a7njI7zpuJLa5iSaw3e"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8c8f60815834416d-LHR
-
Remote address:104.21.67.152:443RequestGET /xml/138.199.29.44 HTTP/1.1
Host: reallyfreegeoip.org
ResponseHTTP/1.1 200 OK
Content-Type: application/xml
Transfer-Encoding: chunked
Connection: keep-alive
access-control-allow-origin: *
vary: Accept-Encoding
Cache-Control: max-age=86400
CF-Cache-Status: HIT
Age: 40166
Last-Modified: Wed, 25 Sep 2024 14:01:30 GMT
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lHvXeeuCVYtfHQRNEaOjHx22eEUcH00kYyY3LVW5T5qTctYWJGI5aX0oo0WNc6iz5W3yfG6PVk84aRHiVUIWRDuNxuP2x6lhXF2GQfz5HrBdn43tBH%2BYT8m1Abgwro3YzYm7y3D%2B"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8c8f608a2e09416d-LHR
alt-svc: h3=":443"; ma=86400
-
Remote address:104.21.67.152:443RequestGET /xml/138.199.29.44 HTTP/1.1
Host: reallyfreegeoip.org
ResponseHTTP/1.1 200 OK
Content-Type: application/xml
Transfer-Encoding: chunked
Connection: keep-alive
access-control-allow-origin: *
vary: Accept-Encoding
Cache-Control: max-age=86400
CF-Cache-Status: HIT
Age: 40166
Last-Modified: Wed, 25 Sep 2024 14:01:30 GMT
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wU0KInevWsYpw4vEiZwYqHeDZ2UFGQ6NBm6S7r4WD86WkMZXw5zAsvR53GEzb60%2FpnIO70svwc9Lm%2BAM51yvKUGFOiDrBGSQBKKe0SkcBhgZ5F2GN%2BC%2BmpTnH6CxtOKcn4koqnAd"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8c8f608c0f72416d-LHR
-
Remote address:104.21.67.152:443RequestGET /xml/138.199.29.44 HTTP/1.1
Host: reallyfreegeoip.org
ResponseHTTP/1.1 200 OK
Content-Type: application/xml
Transfer-Encoding: chunked
Connection: keep-alive
access-control-allow-origin: *
vary: Accept-Encoding
Cache-Control: max-age=86400
CF-Cache-Status: HIT
Age: 40167
Last-Modified: Wed, 25 Sep 2024 14:01:30 GMT
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=c8iozFid40Ojs7WJcPa6F%2BrBbUfZwJg4IhBt4k1VwLhZwxA%2BZsvkVZpPxgIV9yZ1OC4rAD%2Fu81VjiC9bwrRGLXCQ0gjJ1IuC%2F6tfR%2F%2BCfsahHqD30Cb9urMwp9nfsrRvp0KhCnxY"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8c8f60941c1e416d-LHR
-
Remote address:104.21.67.152:443RequestGET /xml/138.199.29.44 HTTP/1.1
Host: reallyfreegeoip.org
ResponseHTTP/1.1 200 OK
Content-Type: application/xml
Transfer-Encoding: chunked
Connection: keep-alive
access-control-allow-origin: *
vary: Accept-Encoding
Cache-Control: max-age=86400
CF-Cache-Status: HIT
Age: 40169
Last-Modified: Wed, 25 Sep 2024 14:01:30 GMT
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oeLTE9ZllupmxiRtQdq%2Fd5zCdoX4z5cmCkzqIV2RH8ja83Yy9wfk9uJOgDN89SHg7SxhAPiGa1lIQy7gt6gSqiFSbvVOI0mIXhlQcR89jqcTBES4ns8SeKuzRkb7MpNSvfMeoOt2"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8c8f609caac8416d-LHR
-
1.8kB 3.8kB 15 22
HTTP Request
GET http://checkip.dyndns.org/HTTP Response
200HTTP Request
GET http://checkip.dyndns.org/HTTP Response
200HTTP Request
GET http://checkip.dyndns.org/HTTP Response
200HTTP Request
GET http://checkip.dyndns.org/HTTP Response
504HTTP Request
GET http://checkip.dyndns.org/HTTP Response
200HTTP Request
GET http://checkip.dyndns.org/HTTP Response
200HTTP Request
GET http://checkip.dyndns.org/HTTP Response
200HTTP Request
GET http://checkip.dyndns.org/HTTP Response
200HTTP Request
GET http://checkip.dyndns.org/HTTP Response
200 -
1.9kB 11.2kB 21 21
HTTP Request
GET https://reallyfreegeoip.org/xml/138.199.29.44HTTP Response
200HTTP Request
GET https://reallyfreegeoip.org/xml/138.199.29.44HTTP Response
200HTTP Request
GET https://reallyfreegeoip.org/xml/138.199.29.44HTTP Response
200HTTP Request
GET https://reallyfreegeoip.org/xml/138.199.29.44HTTP Response
200HTTP Request
GET https://reallyfreegeoip.org/xml/138.199.29.44HTTP Response
200HTTP Request
GET https://reallyfreegeoip.org/xml/138.199.29.44HTTP Response
200HTTP Request
GET https://reallyfreegeoip.org/xml/138.199.29.44HTTP Response
200
-
64 B 176 B 1 1
DNS Request
checkip.dyndns.org
DNS Response
132.226.8.169193.122.6.168132.226.247.73158.101.44.242193.122.130.0
-
65 B 97 B 1 1
DNS Request
reallyfreegeoip.org
DNS Response
104.21.67.152172.67.177.134