Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
7s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 22:25
Behavioral task
behavioral1
Sample
Dehasher.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Dehasher.exe
Resource
win10v2004-20240802-en
General
-
Target
Dehasher.exe
-
Size
1.1MB
-
MD5
be43176a494e84f0beb04cdd86efd67d
-
SHA1
09e738c02dfe2e8664d7072ee2d9df3fea7e2079
-
SHA256
76a429a6968d22df6339119f21f83ad0337ad9d60be818b328dbdc8cacfbcaeb
-
SHA512
8a8c01bb1c4aa8db4346d693c2650862f8965b897ffbabc19e04a091964b20b093e27be5fd19d7e37eb81816275b2e8da40d289c3fa3485f047d9e527a00ce11
-
SSDEEP
24576:OCUG////SMrrr8SSCrirMSpSc9CLtrDrHO37kw8m657w6ZBLmkitKqBCjC0PDgMW:OCUd37bVV1BCjB
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7044437613:AAEXeS1SKGTrEjQ8F-7vSegWo8OLABeJY5k/sendMessage?chat_id=6052812018
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Detect Neshta payload 2 IoCs
resource yara_rule behavioral2/files/0x0009000000023455-4.dat family_neshta behavioral2/memory/1708-272-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 3 IoCs
resource yara_rule behavioral2/files/0x0009000000023455-4.dat family_stormkitty behavioral2/files/0x00070000000234bb-29.dat family_stormkitty behavioral2/memory/1040-33-0x0000000000EA0000-0x0000000000ED2000-memory.dmp family_stormkitty -
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x00070000000234bb-29.dat family_asyncrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation Dehasher.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation LET.EXE -
Executes dropped EXE 3 IoCs
pid Process 1708 LET.EXE 4336 VIPERDEHASHER.EXE 1040 LET.EXE -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" LET.EXE -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\7118e685d4aa6b91f43797eecc33b54b\Admin@OARDHGDN_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini LET.EXE File opened for modification C:\Users\Admin\AppData\Local\7118e685d4aa6b91f43797eecc33b54b\Admin@OARDHGDN_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini LET.EXE File created C:\Users\Admin\AppData\Local\7118e685d4aa6b91f43797eecc33b54b\Admin@OARDHGDN_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini LET.EXE File created C:\Users\Admin\AppData\Local\7118e685d4aa6b91f43797eecc33b54b\Admin@OARDHGDN_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini LET.EXE File created C:\Users\Admin\AppData\Local\7118e685d4aa6b91f43797eecc33b54b\Admin@OARDHGDN_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini LET.EXE File created C:\Users\Admin\AppData\Local\7118e685d4aa6b91f43797eecc33b54b\Admin@OARDHGDN_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini LET.EXE File created C:\Users\Admin\AppData\Local\7118e685d4aa6b91f43797eecc33b54b\Admin@OARDHGDN_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini LET.EXE -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe LET.EXE File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe LET.EXE File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE LET.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE LET.EXE File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.15\MICROS~4.EXE LET.EXE File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe LET.EXE File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe LET.EXE File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe LET.EXE File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE LET.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE LET.EXE File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe LET.EXE File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe LET.EXE File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe LET.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE LET.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE LET.EXE File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.15\MICROS~1.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.15\MI391D~1.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.15\MIA062~1.EXE LET.EXE File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe LET.EXE File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe LET.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE LET.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE LET.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE LET.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE LET.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe LET.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE LET.EXE File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe LET.EXE File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13195~1.15\MICROS~1.EXE LET.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe LET.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE LET.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe LET.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.15\MICROS~3.EXE LET.EXE File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe LET.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE LET.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe LET.EXE File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE LET.EXE File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe LET.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.15\MI9C33~1.EXE LET.EXE File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE LET.EXE File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe LET.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe LET.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE LET.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.15\MICROS~2.EXE LET.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE LET.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE LET.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE LET.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe LET.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE LET.EXE -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com LET.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VIPERDEHASHER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LET.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dehasher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LET.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 4688 cmd.exe 5004 netsh.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" LET.EXE -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1040 LET.EXE 1040 LET.EXE 1040 LET.EXE 1040 LET.EXE 1040 LET.EXE 1040 LET.EXE 1040 LET.EXE 1040 LET.EXE 1040 LET.EXE 1040 LET.EXE 1040 LET.EXE 1040 LET.EXE 1040 LET.EXE 1040 LET.EXE 1040 LET.EXE 1040 LET.EXE 1040 LET.EXE 1040 LET.EXE 1040 LET.EXE 1040 LET.EXE 1040 LET.EXE 1040 LET.EXE 1040 LET.EXE 1040 LET.EXE 1040 LET.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1040 LET.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1708 2344 Dehasher.exe 82 PID 2344 wrote to memory of 1708 2344 Dehasher.exe 82 PID 2344 wrote to memory of 1708 2344 Dehasher.exe 82 PID 2344 wrote to memory of 4336 2344 Dehasher.exe 83 PID 2344 wrote to memory of 4336 2344 Dehasher.exe 83 PID 2344 wrote to memory of 4336 2344 Dehasher.exe 83 PID 1708 wrote to memory of 1040 1708 LET.EXE 84 PID 1708 wrote to memory of 1040 1708 LET.EXE 84 PID 1708 wrote to memory of 1040 1708 LET.EXE 84 PID 1040 wrote to memory of 4688 1040 LET.EXE 86 PID 1040 wrote to memory of 4688 1040 LET.EXE 86 PID 1040 wrote to memory of 4688 1040 LET.EXE 86 PID 1040 wrote to memory of 432 1040 LET.EXE 91 PID 1040 wrote to memory of 432 1040 LET.EXE 91 PID 1040 wrote to memory of 432 1040 LET.EXE 91 PID 432 wrote to memory of 2344 432 cmd.exe 93 PID 432 wrote to memory of 2344 432 cmd.exe 93 PID 432 wrote to memory of 2344 432 cmd.exe 93 PID 432 wrote to memory of 2824 432 cmd.exe 94 PID 432 wrote to memory of 2824 432 cmd.exe 94 PID 432 wrote to memory of 2824 432 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dehasher.exe"C:\Users\Admin\AppData\Local\Temp\Dehasher.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\LET.EXE"C:\Users\Admin\AppData\Local\Temp\LET.EXE"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\3582-490\LET.EXE"C:\Users\Admin\AppData\Local\Temp\3582-490\LET.EXE"3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4688 -
C:\Windows\SysWOW64\chcp.comchcp 650015⤵
- System Location Discovery: System Language Discovery
PID:1700
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5004
-
-
C:\Windows\SysWOW64\findstr.exefindstr All5⤵
- System Location Discovery: System Language Discovery
PID:4780
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\chcp.comchcp 650015⤵
- System Location Discovery: System Language Discovery
PID:2344
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2824
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\VIPERDEHASHER.EXE"C:\Users\Admin\AppData\Local\Temp\VIPERDEHASHER.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4336
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Change Default File Association
1Netsh Helper DLL
1Privilege Escalation
Event Triggered Execution
2Change Default File Association
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\7118e685d4aa6b91f43797eecc33b54b\Admin@OARDHGDN_en-US\Browsers\Firefox\Bookmarks.txt
Filesize105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
C:\Users\Admin\AppData\Local\7118e685d4aa6b91f43797eecc33b54b\Admin@OARDHGDN_en-US\System\Process.txt
Filesize4KB
MD5841e8053ae04c42b0b7a3a8bddb7f4c9
SHA16c8e09c9162dd88474fdb9282002256930b37d3f
SHA256cfe8a4df99784bcc6f2d0778a286424cda5750c5c0f8f3c28f3d5d85108e6124
SHA5129550b30a92d7a1623557733550779a3da063fa4ecfedcf16e230838e8e518ba25a8ad3cd90ab08fb12bd934d7778bd40287b1e44c2fe81b9272d44e3235e7a5e
-
Filesize
175KB
MD5c7235b3be7873e0743aba6235cd3d677
SHA12481321813caff4ded19135c86301f899fb19f66
SHA2564902c56dfa5b513df7c00f8fe5df90dcc46a03f194dca424ebbf6f03e7904486
SHA5127310beb111ca489fd6348d40cea921d8854d99858cb2b9dc7d8211009a8c958374832f585f2cb25962e7ed3a453ca11102b7fb47be0eff8d2a7bc2b564928860
-
Filesize
216KB
MD5cb66ae727ba5ed3a3c1b1fc60dadb152
SHA16def0bea71e985e041c5796b959814b36d75e551
SHA25651c82632119b14af345b42ec4bce4c780d81502b8ec67b63b631c6830fb845d6
SHA51284b9219eac6fc235f74a063cad74625350132b4481c5653fa47ba8dbb0319798a5c1d5aa07701e4b542bd7fc8330dcfc3ce4037baa4af86a0bbea1d6e9b2c901
-
Filesize
892KB
MD55a6ac9ed6969b3be67d1d45813ee0662
SHA12b7a10d8f9c062905b2aff6c6d3a31a85c4f74fb
SHA25693f31fdee5f1701424d12d3445d2c8afdf8073f79ebccf0c61e173b9b20b90a9
SHA51237380b1c355dff936b46177d5315d82e74ede89fc986b12771be9300a0a041142de8cdb32e582e72c92c287b55b07a02be46172ba47a7be97a65879daf04a883