Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3LOADER.rar
windows10-2004-x64
3LOADER/AlphaFS.dll
windows10-2004-x64
1LOADER/Loader.exe
windows10-2004-x64
7LOADER/libEGL.dll
windows10-2004-x64
1LOADER/mod...47.dll
windows10-2004-x64
1LOADER/swi...GL.dll
windows10-2004-x64
1LOADER/swi...v2.dll
windows10-2004-x64
1LOADER/vulkan-1.dll
windows10-2004-x64
1Resubmissions
31/10/2023, 11:21
231031-ngcwmsff6w 7Analysis
-
max time kernel
141s -
max time network
265s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 11:21
Static task
static1
Behavioral task
behavioral1
Sample
LOADER.rar
Resource
win10v2004-20231023-en
Behavioral task
behavioral2
Sample
LOADER/AlphaFS.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
LOADER/Loader.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral4
Sample
LOADER/libEGL.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
LOADER/modules/x64/d3d/d3dcompiler_47.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral6
Sample
LOADER/swiftshader/libEGL.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
LOADER/swiftshader/libGLESv2.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral8
Sample
LOADER/vulkan-1.dll
Resource
win10v2004-20231020-en
General
-
Target
LOADER/Loader.exe
-
Size
680KB
-
MD5
5d2ea1be827408b10f7f3dd00050216e
-
SHA1
0fb5593bcfb19b67dbaff3c5127d61acac7e0a0c
-
SHA256
691b62e6f9ecb659d8c0edb494a510d2065d31adb4cfb25cba9529201071ccef
-
SHA512
36719717af5fc0f0b7bb7e936672a80be4b44d53e50ef7d7b4e7128882ab4726d24ca215881d475f582234dcf58a398aad0554de106e7ba8fb19e6bbace2ff96
-
SSDEEP
12288:MusMdxnricL0xzonhWwnW56viEUrvPiKaTicl80cwenIS93p3qVj4FTL:rnWcLIzMWFjvDPiKaTiclDcwi93MVj8X
Malware Config
Signatures
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe 2176 Loader.exe