Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
3daf9e6ae81363247c5f955329c41d5b.exe
Resource
win7-20231215-en
General
-
Target
3daf9e6ae81363247c5f955329c41d5b.exe
-
Size
41KB
-
MD5
3daf9e6ae81363247c5f955329c41d5b
-
SHA1
7d0d61155a59d3122f191eba20eeff836424523d
-
SHA256
38e5fd8f4bb3ed7d8ff33f91d9c467670083b5f03c12293f2c5f46a04d0127e2
-
SHA512
1751a07f32581c85c5bcefa61198a41cb8d9138282403ab87606b936efe27430038a0f2039d7b3f2a41e4eb9ab9f113e9d3c0e679e0dae225cb60b3b11381556
-
SSDEEP
768:4QGiv2CKlMTFlhJDIVwqXlyOraLmMhJ3iR5Np9KtwkS7Cm94COfsziPg:3VvlKlCFWVnXlyOGD3i/L9OpS79vYsz9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1260 Stell.exe -
Loads dropped DLL 1 IoCs
pid Process 2120 3daf9e6ae81363247c5f955329c41d5b.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Stell.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Stell.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Stell.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2848 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1260 Stell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2120 wrote to memory of 1260 2120 3daf9e6ae81363247c5f955329c41d5b.exe 27 PID 2120 wrote to memory of 1260 2120 3daf9e6ae81363247c5f955329c41d5b.exe 27 PID 2120 wrote to memory of 1260 2120 3daf9e6ae81363247c5f955329c41d5b.exe 27 PID 2120 wrote to memory of 1260 2120 3daf9e6ae81363247c5f955329c41d5b.exe 27 PID 2120 wrote to memory of 2848 2120 3daf9e6ae81363247c5f955329c41d5b.exe 28 PID 2120 wrote to memory of 2848 2120 3daf9e6ae81363247c5f955329c41d5b.exe 28 PID 2120 wrote to memory of 2848 2120 3daf9e6ae81363247c5f955329c41d5b.exe 28 PID 2120 wrote to memory of 2848 2120 3daf9e6ae81363247c5f955329c41d5b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3daf9e6ae81363247c5f955329c41d5b.exe"C:\Users\Admin\AppData\Local\Temp\3daf9e6ae81363247c5f955329c41d5b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\Stell.exe"C:\Users\Admin\AppData\Local\Temp\Stell.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1260
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\prohy.txt2⤵
- Opens file in notepad (likely ransom note)
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD59b184272fa8eecb5c99fc1805ac7529e
SHA1f9a21718765f6f842049513a8779dc738917f8af
SHA256796db843fcb613b8a6307307ad3456e451de984cd64c14f038eb0552a3342cc1
SHA51277fb8972d85dfd8d96793086f6405426834901853cd0d934f890b3e9473c30d2057fdfa94703e289b35ef83097081b73308676ae419fd517aacac2c36fee53c5
-
Filesize
1KB
MD5bde7ff0702e575892d97d0335cb71f1b
SHA14a527daf49c17c14e1fc3149e4e2a993e6ca3f8d
SHA25671801d0a9c855653580b08d6cdb9a05f15c51a330c63abeff01ff3929153c5a7
SHA512e1ecc405e6e119d1fa03a636310df4fd9c53c78b1487871e41abf122d85bfccce8420d21c9fa3b3e750355d409afb7be9e87931f73393db8cf65010063f646f6
-
Filesize
22KB
MD5ae0f7196eb6ca11f59fdf63c6bcfd488
SHA18308a06843f003d65ad608767f0278e8b4019d41
SHA25601255c3a07b62f23832c1635d1f6e822d7b85ba34f32fbaa0e0c90c06b25fd12
SHA512c27f8ec49eb252097394164e6469e96030c87f4d41a3233f19704d85ac60253cbdbd3e2ae4afd317de76d30163f9f65503d65c0adb431c540397961d54dc3e05