Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
106s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2025, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
FATURAS.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
FATURAS.exe
Resource
win10v2004-20250313-en
General
-
Target
FATURAS.exe
-
Size
544KB
-
MD5
5d77cd7033187dfc736119b570bee5b5
-
SHA1
78dd8d7621e5bd13369bc0f921ab11ebdc8ba146
-
SHA256
f20f9cb6076b4f3ad87fa30da557257802b0f5093cffca1cf4c8359105b1a3ed
-
SHA512
155439b5c187815107770e59294b839895283ef412b86716dddf2f4b5fc26f134f4500e90c1c07933b2154fd3359f1ecbd21720f75e685529acda2c81fb1c2bc
-
SSDEEP
12288:ciGRHxB1qAJbgg7bjBhZNq/CGiUy3pKIHWzURPdApr9CdRjmYLwfXA+8:cVTXgCJh7q/5ih3IUSExLOAz
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7811478868:AAFz8G54tjfmoXGXiHlkaDDwEoEtiu2Dae8/sendMessage?chat_id=5692813672
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral2/memory/4692-28-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3348 powershell.exe 3996 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation FATURAS.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation FATURAS.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 checkip.dyndns.org 20 reallyfreegeoip.org 21 reallyfreegeoip.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3864 set thread context of 4692 3864 FATURAS.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FATURAS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FATURAS.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6052 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3348 powershell.exe 3996 powershell.exe 3864 FATURAS.exe 3864 FATURAS.exe 3864 FATURAS.exe 3864 FATURAS.exe 4692 FATURAS.exe 3348 powershell.exe 3996 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3348 powershell.exe Token: SeDebugPrivilege 3996 powershell.exe Token: SeDebugPrivilege 3864 FATURAS.exe Token: SeDebugPrivilege 4692 FATURAS.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3864 wrote to memory of 3348 3864 FATURAS.exe 87 PID 3864 wrote to memory of 3348 3864 FATURAS.exe 87 PID 3864 wrote to memory of 3348 3864 FATURAS.exe 87 PID 3864 wrote to memory of 3996 3864 FATURAS.exe 89 PID 3864 wrote to memory of 3996 3864 FATURAS.exe 89 PID 3864 wrote to memory of 3996 3864 FATURAS.exe 89 PID 3864 wrote to memory of 6052 3864 FATURAS.exe 91 PID 3864 wrote to memory of 6052 3864 FATURAS.exe 91 PID 3864 wrote to memory of 6052 3864 FATURAS.exe 91 PID 3864 wrote to memory of 4804 3864 FATURAS.exe 93 PID 3864 wrote to memory of 4804 3864 FATURAS.exe 93 PID 3864 wrote to memory of 4804 3864 FATURAS.exe 93 PID 3864 wrote to memory of 4856 3864 FATURAS.exe 94 PID 3864 wrote to memory of 4856 3864 FATURAS.exe 94 PID 3864 wrote to memory of 4856 3864 FATURAS.exe 94 PID 3864 wrote to memory of 4692 3864 FATURAS.exe 95 PID 3864 wrote to memory of 4692 3864 FATURAS.exe 95 PID 3864 wrote to memory of 4692 3864 FATURAS.exe 95 PID 3864 wrote to memory of 4692 3864 FATURAS.exe 95 PID 3864 wrote to memory of 4692 3864 FATURAS.exe 95 PID 3864 wrote to memory of 4692 3864 FATURAS.exe 95 PID 3864 wrote to memory of 4692 3864 FATURAS.exe 95 PID 3864 wrote to memory of 4692 3864 FATURAS.exe 95 PID 4692 wrote to memory of 4148 4692 FATURAS.exe 96 PID 4692 wrote to memory of 4148 4692 FATURAS.exe 96 PID 4692 wrote to memory of 4148 4692 FATURAS.exe 96 PID 4148 wrote to memory of 2000 4148 cmd.exe 98 PID 4148 wrote to memory of 2000 4148 cmd.exe 98 PID 4148 wrote to memory of 2000 4148 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\FATURAS.exe"C:\Users\Admin\AppData\Local\Temp\FATURAS.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\FATURAS.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\XzjAzTkFScYh.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XzjAzTkFScYh" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7937.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6052
-
-
C:\Users\Admin\AppData\Local\Temp\FATURAS.exe"C:\Users\Admin\AppData\Local\Temp\FATURAS.exe"2⤵PID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\FATURAS.exe"C:\Users\Admin\AppData\Local\Temp\FATURAS.exe"2⤵PID:4856
-
-
C:\Users\Admin\AppData\Local\Temp\FATURAS.exe"C:\Users\Admin\AppData\Local\Temp\FATURAS.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\FATURAS.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 34⤵
- System Location Discovery: System Language Discovery
PID:2000
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD56cd283bbc628e8af0bd62ee96292f390
SHA161511888b78be731e307453e3430c1729f029666
SHA2561db25e766c41753d6185ef9a80f7fa77bc178815e91289eb2f88bfe41e21459b
SHA512c7c1581de063cb1116b3e1cfa25587e9eeee0a9db533e4f2250896a39447fbb7f360bf546e87541d9950c71fe557c618469da42a4dc8acd9fbc17203424d8530
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5219f742a3b23b0eedfd8e3005a391f50
SHA1ac7ba03e564a603fe08501e7381080d4fd0ec146
SHA256c05d5a9b6454836689b1b1919589bffcd67690849660ccecbfd7aa9db35175fb
SHA512f1ea330c141c17bff6b96a5e618ad0e13345c69d3b46a584b82d80bf7efcfd80b379628599ac937647c0e2b7d038a77d1b84c6287a5dd111088ad06177305b0a