Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 12:12
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Quotation.exe
Resource
win10v2004-20241007-en
General
-
Target
Quotation.exe
-
Size
804KB
-
MD5
3c290037d606c31294f2a78bbf7ebf50
-
SHA1
c7b05d667d0349567a44aad7a6d085b7b13ccb0b
-
SHA256
e86dd6f8d70cbc4581e91e9728fd91ec5b760347ea9abe5a0b51dec8ca373cbc
-
SHA512
f50642e95d612cb3dfb8df55a8d0db2ce9c9d620996425cf7b429dd047841497f2f6b3a1b6204506b63480c08ec238f7f39eb96f4ec9e73d0cc2ace77a0739d2
-
SSDEEP
12288:QNdp1nqBwYran9ARHK7zbOS6F+Z1vmlng/s7MH13ivgAMVJBMOR1O+nQomGMM:QL0nrKAcvO3Fat+gsiSMVL1hBmd
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
M*eeFf@7 - Email To:
[email protected]
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 5 IoCs
resource yara_rule behavioral1/memory/2776-15-0x0000000000400000-0x0000000000424000-memory.dmp family_snakekeylogger behavioral1/memory/2776-24-0x0000000000400000-0x0000000000424000-memory.dmp family_snakekeylogger behavioral1/memory/2776-21-0x0000000000400000-0x0000000000424000-memory.dmp family_snakekeylogger behavioral1/memory/2776-19-0x0000000000400000-0x0000000000424000-memory.dmp family_snakekeylogger behavioral1/memory/2776-16-0x0000000000400000-0x0000000000424000-memory.dmp family_snakekeylogger -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org 8 freegeoip.app 9 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2420 set thread context of 2776 2420 Quotation.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2660 2776 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quotation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quotation.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2992 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2420 Quotation.exe 2776 Quotation.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2420 Quotation.exe Token: SeDebugPrivilege 2776 Quotation.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2992 2420 Quotation.exe 31 PID 2420 wrote to memory of 2992 2420 Quotation.exe 31 PID 2420 wrote to memory of 2992 2420 Quotation.exe 31 PID 2420 wrote to memory of 2992 2420 Quotation.exe 31 PID 2420 wrote to memory of 2776 2420 Quotation.exe 33 PID 2420 wrote to memory of 2776 2420 Quotation.exe 33 PID 2420 wrote to memory of 2776 2420 Quotation.exe 33 PID 2420 wrote to memory of 2776 2420 Quotation.exe 33 PID 2420 wrote to memory of 2776 2420 Quotation.exe 33 PID 2420 wrote to memory of 2776 2420 Quotation.exe 33 PID 2420 wrote to memory of 2776 2420 Quotation.exe 33 PID 2420 wrote to memory of 2776 2420 Quotation.exe 33 PID 2420 wrote to memory of 2776 2420 Quotation.exe 33 PID 2776 wrote to memory of 2660 2776 Quotation.exe 34 PID 2776 wrote to memory of 2660 2776 Quotation.exe 34 PID 2776 wrote to memory of 2660 2776 Quotation.exe 34 PID 2776 wrote to memory of 2660 2776 Quotation.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mNRUoOqGo" /XML "C:\Users\Admin\AppData\Local\Temp\tmp582E.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2992
-
-
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 15803⤵
- Program crash
PID:2660
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fd94564afabea9e2366b79904baeb7de
SHA110096e32b0b0b89c24ab021cacda1141bfff4ff6
SHA256abab92e8be8f96fcba7f20a2c2298ea86fcc637a6c634a1e229a8a72429766bb
SHA51207c913d0542d9abcd095d02436d71b74567356389afa8fe0616d20010fc7b95bab898248bc76a34638269ee9542bb8f5bf93d41f72fd5ff3fec2badc7b77da87