Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
3daf9e6ae81363247c5f955329c41d5b.exe
Resource
win7-20231215-en
General
-
Target
3daf9e6ae81363247c5f955329c41d5b.exe
-
Size
41KB
-
MD5
3daf9e6ae81363247c5f955329c41d5b
-
SHA1
7d0d61155a59d3122f191eba20eeff836424523d
-
SHA256
38e5fd8f4bb3ed7d8ff33f91d9c467670083b5f03c12293f2c5f46a04d0127e2
-
SHA512
1751a07f32581c85c5bcefa61198a41cb8d9138282403ab87606b936efe27430038a0f2039d7b3f2a41e4eb9ab9f113e9d3c0e679e0dae225cb60b3b11381556
-
SSDEEP
768:4QGiv2CKlMTFlhJDIVwqXlyOraLmMhJ3iR5Np9KtwkS7Cm94COfsziPg:3VvlKlCFWVnXlyOGD3i/L9OpS79vYsz9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 3daf9e6ae81363247c5f955329c41d5b.exe -
Executes dropped EXE 1 IoCs
pid Process 980 Stell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Stell.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Stell.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Stell.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings 3daf9e6ae81363247c5f955329c41d5b.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 5112 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 980 Stell.exe 980 Stell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1260 wrote to memory of 980 1260 3daf9e6ae81363247c5f955329c41d5b.exe 89 PID 1260 wrote to memory of 980 1260 3daf9e6ae81363247c5f955329c41d5b.exe 89 PID 1260 wrote to memory of 980 1260 3daf9e6ae81363247c5f955329c41d5b.exe 89 PID 1260 wrote to memory of 5112 1260 3daf9e6ae81363247c5f955329c41d5b.exe 90 PID 1260 wrote to memory of 5112 1260 3daf9e6ae81363247c5f955329c41d5b.exe 90 PID 1260 wrote to memory of 5112 1260 3daf9e6ae81363247c5f955329c41d5b.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3daf9e6ae81363247c5f955329c41d5b.exe"C:\Users\Admin\AppData\Local\Temp\3daf9e6ae81363247c5f955329c41d5b.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\Stell.exe"C:\Users\Admin\AppData\Local\Temp\Stell.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:980
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\prohy.txt2⤵
- Opens file in notepad (likely ransom note)
PID:5112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5ae0f7196eb6ca11f59fdf63c6bcfd488
SHA18308a06843f003d65ad608767f0278e8b4019d41
SHA25601255c3a07b62f23832c1635d1f6e822d7b85ba34f32fbaa0e0c90c06b25fd12
SHA512c27f8ec49eb252097394164e6469e96030c87f4d41a3233f19704d85ac60253cbdbd3e2ae4afd317de76d30163f9f65503d65c0adb431c540397961d54dc3e05
-
Filesize
18KB
MD59b184272fa8eecb5c99fc1805ac7529e
SHA1f9a21718765f6f842049513a8779dc738917f8af
SHA256796db843fcb613b8a6307307ad3456e451de984cd64c14f038eb0552a3342cc1
SHA51277fb8972d85dfd8d96793086f6405426834901853cd0d934f890b3e9473c30d2057fdfa94703e289b35ef83097081b73308676ae419fd517aacac2c36fee53c5
-
Filesize
1KB
MD532aa3977dead1c1592ef57d6145ebe3e
SHA11d4d21dd7cfaf174e2c31f858a4c758fed3fcc0e
SHA256783f48529db415a975ea539bae005636b0444bb0c447f17633c76c3b4ad9b875
SHA51298e493a67e4d35fa3fe0cf2f7d66c3bf6d7b048ffd10b400eae30adb221a93c7df850d2bc431a3450d507f48c4a8d2553722359df5d758d5c48d2d71df3dc4ea