Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
132s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
02/11/2023, 16:31
Static task
static1
General
-
Target
5b0017ef2fbd79d5365657aca35863bbaf7609616b207e7d68e293652bc41b23.exe
-
Size
239KB
-
MD5
d11243a9aea023b79805ce4c0935af8a
-
SHA1
99942470433c5398602d36a58c2ddced623f2f2f
-
SHA256
5b0017ef2fbd79d5365657aca35863bbaf7609616b207e7d68e293652bc41b23
-
SHA512
41ba65d816c1348a35a7e197c701c1566a6dab89563774fb860c11c134d12be728f487fdb5c53101f00cfb83b35da84164982f3709425153d67cfeada8d4960b
-
SSDEEP
3072:FLoeHIHPbxSC3EXuEfS4UkDzqLmLrDweMsllTLO2Pmw2i0xYTAV:BoFHPbxIXuES4/vkm/DweMsjLOomY0i
Malware Config
Extracted
stealc
http://ronaldrichards.icu
-
url_path
/e9c345fc99a4e67e.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 980 4464 WerFault.exe 70 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5b0017ef2fbd79d5365657aca35863bbaf7609616b207e7d68e293652bc41b23.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5b0017ef2fbd79d5365657aca35863bbaf7609616b207e7d68e293652bc41b23.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4464 5b0017ef2fbd79d5365657aca35863bbaf7609616b207e7d68e293652bc41b23.exe 4464 5b0017ef2fbd79d5365657aca35863bbaf7609616b207e7d68e293652bc41b23.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b0017ef2fbd79d5365657aca35863bbaf7609616b207e7d68e293652bc41b23.exe"C:\Users\Admin\AppData\Local\Temp\5b0017ef2fbd79d5365657aca35863bbaf7609616b207e7d68e293652bc41b23.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 11962⤵
- Program crash
PID:980
-