Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    63s
  • max time network
    65s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 03:32 UTC

General

  • Target

    P984758.exe

  • Size

    846KB

  • MD5

    c5af54622602c908d5af6c3d8d7bdb09

  • SHA1

    67fbbcaef7c841afc2af6cda2740b3f934cd9c15

  • SHA256

    bbeac700ec88ce4b23f0bb5c996effc1586ef0e7802bc18695ecd3845a2a0022

  • SHA512

    b1194332113c466ddfb55bf4f6f0dd6a04bc3ceeac9654a913d0ac38689a93fa08888b950af0a701cfb7490ca1c322fbebe77f281be27c2a2a05e78dfa3d8961

  • SSDEEP

    24576:5vVPp9AR95STVO0NF64RWPOyvzQ6bnVOGeuo8:5vVPpKRSs0KBOybx

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.fyontej.com
  • Port:
    25
  • Username:
    mercy@fyontej.com
  • Password:
    g#DXj@Ws8
  • Email To:
    mercy@fyontej.com

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 5 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\P984758.exe
    "C:\Users\Admin\AppData\Local\Temp\P984758.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KOjqORarEZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp864F.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2004
    • C:\Users\Admin\AppData\Local\Temp\P984758.exe
      "C:\Users\Admin\AppData\Local\Temp\P984758.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 1576
        3⤵
        • Program crash
        PID:1796

Network

  • flag-us
    DNS
    checkip.dyndns.org
    P984758.exe
    Remote address:
    8.8.8.8:53
    Request
    checkip.dyndns.org
    IN A
    Response
    checkip.dyndns.org
    IN CNAME
    checkip.dyndns.com
    checkip.dyndns.com
    IN A
    193.122.6.168
    checkip.dyndns.com
    IN A
    158.101.44.242
    checkip.dyndns.com
    IN A
    132.226.8.169
    checkip.dyndns.com
    IN A
    193.122.130.0
    checkip.dyndns.com
    IN A
    132.226.247.73
  • flag-de
    GET
    http://checkip.dyndns.org/
    P984758.exe
    Remote address:
    193.122.6.168:80
    Request
    GET / HTTP/1.1
    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
    Host: checkip.dyndns.org
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Date: Wed, 09 Oct 2024 12:11:39 GMT
    Content-Type: text/html
    Content-Length: 105
    Connection: keep-alive
    Cache-Control: no-cache
    Pragma: no-cache
    X-Request-ID: 083c916f44f59f602d5bcd9c564a83d8
  • flag-de
    GET
    http://checkip.dyndns.org/
    P984758.exe
    Remote address:
    193.122.6.168:80
    Request
    GET / HTTP/1.1
    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
    Host: checkip.dyndns.org
    Response
    HTTP/1.1 200 OK
    Date: Wed, 09 Oct 2024 12:11:41 GMT
    Content-Type: text/html
    Content-Length: 105
    Connection: keep-alive
    Cache-Control: no-cache
    Pragma: no-cache
    X-Request-ID: f084dd07515511b7a1cd7002f7267fff
  • flag-us
    DNS
    freegeoip.app
    P984758.exe
    Remote address:
    8.8.8.8:53
    Request
    freegeoip.app
    IN A
    Response
    freegeoip.app
    IN A
    172.67.160.84
    freegeoip.app
    IN A
    104.21.73.97
  • flag-us
    GET
    https://freegeoip.app/xml/138.199.29.44
    P984758.exe
    Remote address:
    172.67.160.84:443
    Request
    GET /xml/138.199.29.44 HTTP/1.1
    Host: freegeoip.app
    Connection: Keep-Alive
    Response
    HTTP/1.1 301 Moved Permanently
    Date: Wed, 09 Oct 2024 12:11:44 GMT
    Content-Type: text/html
    Content-Length: 167
    Connection: keep-alive
    Cache-Control: max-age=3600
    Expires: Wed, 09 Oct 2024 13:11:44 GMT
    Location: https://ipbase.com/xml/138.199.29.44
    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kqJsou2cYDn0EVZ4lx0gG3YAoIjr8tJLc14CXVgnEkh6mmSba2NVY50WWIkFzDrrMHJgLknvyLdJ%2FDQA63Ru4EIMzBcjPAvItt%2FHzyfXar8U7SLC8I%2B1AsJ5cqEUnCn1"}],"group":"cf-nel","max_age":604800}
    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
    Speculation-Rules: "/cdn-cgi/speculation"
    Server: cloudflare
    CF-RAY: 8cfe4664b8f53854-LHR
  • flag-us
    DNS
    ipbase.com
    P984758.exe
    Remote address:
    8.8.8.8:53
    Request
    ipbase.com
    IN A
    Response
    ipbase.com
    IN A
    172.67.209.71
    ipbase.com
    IN A
    104.21.85.189
  • flag-us
    GET
    https://ipbase.com/xml/138.199.29.44
    P984758.exe
    Remote address:
    172.67.209.71:443
    Request
    GET /xml/138.199.29.44 HTTP/1.1
    Host: ipbase.com
    Connection: Keep-Alive
    Response
    HTTP/1.1 404 Not Found
    Date: Wed, 09 Oct 2024 12:11:45 GMT
    Content-Type: text/html; charset=utf-8
    Transfer-Encoding: chunked
    Connection: keep-alive
    Age: 0
    Cache-Control: public,max-age=0,must-revalidate
    Cache-Status: "Netlify Edge"; fwd=miss
    Vary: Accept-Encoding
    X-Nf-Request-Id: 01J9RK2F13JFF1WBRN3PD3EADQ
    cf-cache-status: DYNAMIC
    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VjxTWkjuWWkivotytenj1SAOzFp%2Fnfbq3xuizKb%2FbqVEokz988JKhJc1Mt8PIzA5Dw5gcvalbkBy9Z1DbDsfTF8Smb0AxiV5Zmsop%2Fi7ClvZkAL1Zu6pK%2FEFgVmE"}],"group":"cf-nel","max_age":604800}
    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
    Speculation-Rules: "/cdn-cgi/speculation"
    Server: cloudflare
    CF-RAY: 8cfe46665a3b88bc-LHR
  • 193.122.6.168:80
    http://checkip.dyndns.org/
    http
    P984758.exe
    594 B
    816 B
    7
    4

    HTTP Request

    GET http://checkip.dyndns.org/

    HTTP Response

    200

    HTTP Request

    GET http://checkip.dyndns.org/

    HTTP Response

    200
  • 172.67.160.84:443
    https://freegeoip.app/xml/138.199.29.44
    tls, http
    P984758.exe
    776 B
    4.9kB
    9
    8

    HTTP Request

    GET https://freegeoip.app/xml/138.199.29.44

    HTTP Response

    301
  • 172.67.209.71:443
    https://ipbase.com/xml/138.199.29.44
    tls, http
    P984758.exe
    813 B
    7.3kB
    10
    13

    HTTP Request

    GET https://ipbase.com/xml/138.199.29.44

    HTTP Response

    404
  • 8.8.8.8:53
    checkip.dyndns.org
    dns
    P984758.exe
    64 B
    176 B
    1
    1

    DNS Request

    checkip.dyndns.org

    DNS Response

    193.122.6.168
    158.101.44.242
    132.226.8.169
    193.122.130.0
    132.226.247.73

  • 8.8.8.8:53
    freegeoip.app
    dns
    P984758.exe
    59 B
    91 B
    1
    1

    DNS Request

    freegeoip.app

    DNS Response

    172.67.160.84
    104.21.73.97

  • 8.8.8.8:53
    ipbase.com
    dns
    P984758.exe
    56 B
    88 B
    1
    1

    DNS Request

    ipbase.com

    DNS Response

    172.67.209.71
    104.21.85.189

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp864F.tmp

    Filesize

    1KB

    MD5

    c910689f3371420dcf5927af2a76fefe

    SHA1

    b8bbc40552f7b034246ebf4d6fc7a0bab6aa6089

    SHA256

    1a4476b272df32b9f5063abc177263b8c4b6b5e7166c986f136b08d713985561

    SHA512

    3c387af3223dec1dcdcd755c87dc3c8e0fa29a9be917dbf458288b884d8d19644c1829c6032f5b2b65a5de5c1c18acfdca3c11f1a738d798de88c61e8f374e25

  • memory/1080-0-0x000000007473E000-0x000000007473F000-memory.dmp

    Filesize

    4KB

  • memory/1080-1-0x0000000000910000-0x00000000009EA000-memory.dmp

    Filesize

    872KB

  • memory/1080-2-0x0000000074730000-0x0000000074E1E000-memory.dmp

    Filesize

    6.9MB

  • memory/1080-3-0x00000000003B0000-0x00000000003C6000-memory.dmp

    Filesize

    88KB

  • memory/1080-4-0x000000007473E000-0x000000007473F000-memory.dmp

    Filesize

    4KB

  • memory/1080-5-0x0000000074730000-0x0000000074E1E000-memory.dmp

    Filesize

    6.9MB

  • memory/1080-6-0x0000000007DB0000-0x0000000007E42000-memory.dmp

    Filesize

    584KB

  • memory/1080-7-0x0000000002030000-0x0000000002056000-memory.dmp

    Filesize

    152KB

  • memory/1080-29-0x0000000074730000-0x0000000074E1E000-memory.dmp

    Filesize

    6.9MB

  • memory/2836-19-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2836-23-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2836-27-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2836-28-0x0000000074730000-0x0000000074E1E000-memory.dmp

    Filesize

    6.9MB

  • memory/2836-25-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2836-21-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2836-15-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2836-17-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2836-13-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2836-30-0x0000000074730000-0x0000000074E1E000-memory.dmp

    Filesize

    6.9MB

  • memory/2836-31-0x0000000074730000-0x0000000074E1E000-memory.dmp

    Filesize

    6.9MB

  • memory/2836-32-0x0000000074730000-0x0000000074E1E000-memory.dmp

    Filesize

    6.9MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.