Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
106465e923bf...61.exe
windows7-x64
106465e923bf...61.exe
windows10-2004-x64
106677fcb62e...50.exe
windows7-x64
36677fcb62e...50.exe
windows10-2004-x64
3691d9802fa...e9.exe
windows7-x64
1691d9802fa...e9.exe
windows10-2004-x64
16a150e7eee...36.exe
windows7-x64
86a150e7eee...36.exe
windows10-2004-x64
86aa340437e...c2.exe
windows7-x64
106aa340437e...c2.exe
windows10-2004-x64
106c5bf2ea45...8f.exe
windows7-x64
106c5bf2ea45...8f.exe
windows10-2004-x64
106e40e3ab02...99.exe
windows7-x64
6e40e3ab02...99.exe
windows10-2004-x64
6f2c23f7e9...78.exe
windows7-x64
76f2c23f7e9...78.exe
windows10-2004-x64
7788cfdaeb7...ed.exe
windows7-x64
7788cfdaeb7...ed.exe
windows10-2004-x64
77cfc40d94f...f2.exe
windows7-x64
37cfc40d94f...f2.exe
windows10-2004-x64
37f237484f5...1d.exe
windows7-x64
17f237484f5...1d.exe
windows10-2004-x64
17f8bcaf3c1...5d.exe
windows7-x64
107f8bcaf3c1...5d.exe
windows10-2004-x64
10863385d41f...34.exe
windows7-x64
10863385d41f...34.exe
windows10-2004-x64
1089c11885c2...31.exe
windows7-x64
1089c11885c2...31.exe
windows10-2004-x64
108abccfea53...41.exe
windows7-x64
18abccfea53...41.exe
windows10-2004-x64
18ea7566ef3...44.exe
windows7-x64
108ea7566ef3...44.exe
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2025, 07:59
Static task
static1
Behavioral task
behavioral1
Sample
6465e923bf241700a250f531b63fc650c66e97c5affa1f70a0aa6a75bf63b561.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6465e923bf241700a250f531b63fc650c66e97c5affa1f70a0aa6a75bf63b561.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
6677fcb62e94c51701129d45bf8b4fe7fc3c570c60a95e67939c4c2830e9d250.exe
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
6677fcb62e94c51701129d45bf8b4fe7fc3c570c60a95e67939c4c2830e9d250.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
691d9802facb4880b056112b035368f77f5f23a56c59a895ae5d1f5182ddbce9.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
691d9802facb4880b056112b035368f77f5f23a56c59a895ae5d1f5182ddbce9.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
6a150e7eee969746cc6cc4579d13d2fd6cef5bdc77223aa24e9a6c1c6bf7b036.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
6a150e7eee969746cc6cc4579d13d2fd6cef5bdc77223aa24e9a6c1c6bf7b036.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
6c5bf2ea45920850b041a5a75288570d464ce6c27da4f16c5f25106089985f8f.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
6c5bf2ea45920850b041a5a75288570d464ce6c27da4f16c5f25106089985f8f.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
6e40e3ab026935212a686af172ed8403d196cfaf350b91915ac31a33d81b3799.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
6e40e3ab026935212a686af172ed8403d196cfaf350b91915ac31a33d81b3799.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
6f2c23f7e99a6712509c9f30f9ce3dcd9ea2bfd6ea020ed3b8dcb3641bd34478.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
6f2c23f7e99a6712509c9f30f9ce3dcd9ea2bfd6ea020ed3b8dcb3641bd34478.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
788cfdaeb7e97e9b24de3cb416d2f88a373d4813a0d362902731f54f519ad3ed.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
788cfdaeb7e97e9b24de3cb416d2f88a373d4813a0d362902731f54f519ad3ed.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
7cfc40d94f3ffc3a8c3c8824f031dcbb07d673cfa1fc7dd6ed02e3ca01c326f2.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
7cfc40d94f3ffc3a8c3c8824f031dcbb07d673cfa1fc7dd6ed02e3ca01c326f2.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
7f237484f5bd1786c2c4eceb85b121443a11f98e62273da8a2b4835ab6c1971d.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
7f237484f5bd1786c2c4eceb85b121443a11f98e62273da8a2b4835ab6c1971d.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
7f8bcaf3c125b12f6b8cc4cd98bfe089b433753bed821414b1fcf6b958b1935d.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
7f8bcaf3c125b12f6b8cc4cd98bfe089b433753bed821414b1fcf6b958b1935d.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
89c11885c24f281671cc737a808764a62e128a0dad890ae6d444d14d682e2631.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
89c11885c24f281671cc737a808764a62e128a0dad890ae6d444d14d682e2631.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
8abccfea539da5a03d784ff60d88d128a3f901e9a9ae51ddb3caf0e05e192341.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
8abccfea539da5a03d784ff60d88d128a3f901e9a9ae51ddb3caf0e05e192341.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
8ea7566ef322ea6fec4ec75f7aed5fd8dad6adceab78f6ea5b557ef925b6a644.exe
Resource
win7-20240903-en
General
-
Target
863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe
-
Size
800KB
-
MD5
affdb23019a5d784fffda0e3f2aad32a
-
SHA1
7de6af9392899efc2c5da2a1f195389088fef9b0
-
SHA256
863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834
-
SHA512
3e9f531a83d21fdd3bed9c5ecc6e8b11f82441d9a52e8a169adfc8328d4885090caf25d4f739074c6dc8f807dca978cacd5d6ade05ef02acd9f61329db5d2685
-
SSDEEP
24576:RFIjcvitx65rubaywV1Fg5mOPF65yxq5:RFIjcvitx65rubyFg5fPE4q5
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7673519259:AAGUwbXxrWPJoCRg_ta-se6HtLD6EqcyAnI/sendMessage?chat_id=7560238910
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 32 reallyfreegeoip.org 33 reallyfreegeoip.org 30 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4736 set thread context of 2836 4736 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4736 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe 4736 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe 4736 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe 4736 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe 2836 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe 2836 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4736 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe Token: SeDebugPrivilege 2836 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4736 wrote to memory of 4744 4736 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe 92 PID 4736 wrote to memory of 4744 4736 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe 92 PID 4736 wrote to memory of 4744 4736 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe 92 PID 4736 wrote to memory of 2836 4736 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe 93 PID 4736 wrote to memory of 2836 4736 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe 93 PID 4736 wrote to memory of 2836 4736 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe 93 PID 4736 wrote to memory of 2836 4736 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe 93 PID 4736 wrote to memory of 2836 4736 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe 93 PID 4736 wrote to memory of 2836 4736 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe 93 PID 4736 wrote to memory of 2836 4736 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe 93 PID 4736 wrote to memory of 2836 4736 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe 93 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe"C:\Users\Admin\AppData\Local\Temp\863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe"C:\Users\Admin\AppData\Local\Temp\863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe"2⤵PID:4744
-
-
C:\Users\Admin\AppData\Local\Temp\863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe"C:\Users\Admin\AppData\Local\Temp\863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe.log
Filesize1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3