Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2025, 14:31
Static task
static1
Behavioral task
behavioral1
Sample
FA031225.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
FA031225.exe
Resource
win10v2004-20250314-en
General
-
Target
FA031225.exe
-
Size
975KB
-
MD5
8662ea1b48530f3a33f452f9425b3da8
-
SHA1
95686f637d76f66ebc45343a3513e7714058c737
-
SHA256
0f7a6cf0d9068cc6ade0e209574e007435e63f67983f05548b07751f103ef322
-
SHA512
149cc3ed3ea5beae5f2dd3acf3afdd18be3eec97ed6452d9d93a6fdd65fba54d536d7ff394c35c4431ccfbd981af4424897b685b4e806b1edba752f38560d193
-
SSDEEP
24576:ru6J33O0c+JY5UZ+XC0kGso6FaQ8FHDCWY:Fu0c++OCvkGs9FaQ+FY
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot8145417072:AAER8KhmgyPoJoyAtLOcMP4ioM6K7ubnhTE/sendMessage?chat_id=7282830258
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral2/memory/2352-7-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Snakekeylogger family
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 checkip.dyndns.org 20 reallyfreegeoip.org 21 reallyfreegeoip.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2488 set thread context of 2352 2488 FA031225.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA031225.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2352 RegSvcs.exe 2352 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2488 FA031225.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2352 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2488 FA031225.exe 2488 FA031225.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2488 FA031225.exe 2488 FA031225.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2352 2488 FA031225.exe 88 PID 2488 wrote to memory of 2352 2488 FA031225.exe 88 PID 2488 wrote to memory of 2352 2488 FA031225.exe 88 PID 2488 wrote to memory of 2352 2488 FA031225.exe 88 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FA031225.exe"C:\Users\Admin\AppData\Local\Temp\FA031225.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\FA031225.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2352
-