Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03/01/2024, 14:45 UTC
Static task
static1
Behavioral task
behavioral1
Sample
791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe
Resource
win10v2004-20231215-en
General
-
Target
791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe
-
Size
13.4MB
-
MD5
6e08d023664e3f4e835ec3ec198b883a
-
SHA1
43f2f3321a51f1ca308af891d2e1dbaaee48b045
-
SHA256
791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad
-
SHA512
41d44ed76ecda43eab891a2e07cb43481478c39797e44ed017654a8bca346b90bfcf4f444532d8e9765173c2e9b26d5f524fe42ec9a7830230fedbe21f9e0ec1
-
SSDEEP
12288:bu5DqC9/n1D0jAV8eCeoIl1TroJMExsi+vakV7tbQ3KtwU:buDXVsUThTFyJm
Malware Config
Extracted
marsstealer
Default
Signatures
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Executes dropped EXE 1 IoCs
pid Process 2384 41AKTQO.exe -
Loads dropped DLL 5 IoCs
pid Process 1388 791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe 1388 791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe 2456 WerFault.exe 2456 WerFault.exe 2456 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2456 2384 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1388 wrote to memory of 2384 1388 791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe 28 PID 1388 wrote to memory of 2384 1388 791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe 28 PID 1388 wrote to memory of 2384 1388 791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe 28 PID 1388 wrote to memory of 2384 1388 791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe 28 PID 2384 wrote to memory of 2456 2384 41AKTQO.exe 31 PID 2384 wrote to memory of 2456 2384 41AKTQO.exe 31 PID 2384 wrote to memory of 2456 2384 41AKTQO.exe 31 PID 2384 wrote to memory of 2456 2384 41AKTQO.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe"C:\Users\Admin\AppData\Local\Temp\791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\41AKTQO.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\41AKTQO.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 8083⤵
- Loads dropped DLL
- Program crash
PID:2456
-
-
Network
-
Remote address:8.8.8.8:53Requestmoscow-post.comIN AResponsemoscow-post.comIN A185.71.67.60
-
Remote address:185.71.67.60:80RequestGET /xaoniu/server/waungowangued/g.php HTTP/1.1
Host: moscow-post.com
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 302 Moved Temporarily
Date: Wed, 03 Jan 2024 14:46:23 GMT
Content-Length: 0
Connection: keep-alive
Location: http://moscow-post.com/xaoniu/server/waungowangued/g.php
Set-Cookie: __hash_=c163791db7f1afa1676e7a182b0a6ccd; Max-Age=900; Path=/
-
Remote address:185.71.67.60:80RequestGET /xaoniu/server/waungowangued/g.php HTTP/1.1
Host: moscow-post.com
Connection: Keep-Alive
Cache-Control: no-cache
Cookie: __hash_=c163791db7f1afa1676e7a182b0a6ccd
ResponseHTTP/1.1 301 Moved Permanently
Date: Wed, 03 Jan 2024 14:46:23 GMT
Content-Type: text/html; charset=iso-8859-1
Transfer-Encoding: chunked
Connection: keep-alive
Set-Cookie: __lhash_=2ce2d1655ce376556b6184c83e66c344; Max-Age=604800; Path=/
Location: http://www.moscow-post.com/xaoniu/server/waungowangued/g.php
-
Remote address:185.71.67.60:80RequestGET /request HTTP/1.1
Host: moscow-post.com
Cache-Control: no-cache
Cookie: __hash_=c163791db7f1afa1676e7a182b0a6ccd; __lhash_=2ce2d1655ce376556b6184c83e66c344
ResponseHTTP/1.1 301 Moved Permanently
Date: Wed, 03 Jan 2024 14:46:37 GMT
Content-Type: text/html; charset=iso-8859-1
Transfer-Encoding: chunked
Connection: keep-alive
Location: http://moscow-post.com/request/
-
Remote address:185.71.67.60:80RequestGET /request/ HTTP/1.1
Host: moscow-post.com
Cache-Control: no-cache
Cookie: __hash_=c163791db7f1afa1676e7a182b0a6ccd; __lhash_=2ce2d1655ce376556b6184c83e66c344
Connection: Keep-Alive
ResponseHTTP/1.1 301 Moved Permanently
Date: Wed, 03 Jan 2024 14:46:38 GMT
Content-Type: text/html; charset=iso-8859-1
Transfer-Encoding: chunked
Connection: keep-alive
Location: http://www.moscow-post.com/request/
-
Remote address:8.8.8.8:53Requestwww.moscow-post.comIN AResponsewww.moscow-post.comIN A185.71.67.60
-
Remote address:8.8.8.8:53Requestwww.moscow-post.comIN A
-
Remote address:185.71.67.60:80RequestGET /xaoniu/server/waungowangued/g.php HTTP/1.1
Host: www.moscow-post.com
Connection: Keep-Alive
Cache-Control: no-cache
Cookie: __hash_=c163791db7f1afa1676e7a182b0a6ccd; __lhash_=2ce2d1655ce376556b6184c83e66c344
ResponseHTTP/1.1 301 Moved Permanently
Date: Wed, 03 Jan 2024 14:46:34 GMT
Content-Type: text/html; charset=iso-8859-1
Transfer-Encoding: chunked
Connection: keep-alive
Location: http://www.moscow-post.su/xaoniu/server/waungowangued/g.php
-
Remote address:185.71.67.60:80RequestGET /request/ HTTP/1.1
Host: www.moscow-post.com
Cache-Control: no-cache
Cookie: __hash_=c163791db7f1afa1676e7a182b0a6ccd; __lhash_=2ce2d1655ce376556b6184c83e66c344
Connection: Keep-Alive
ResponseHTTP/1.1 301 Moved Permanently
Date: Wed, 03 Jan 2024 14:46:39 GMT
Content-Type: text/html; charset=iso-8859-1
Transfer-Encoding: chunked
Connection: keep-alive
Location: http://www.moscow-post.su/request/
-
Remote address:8.8.8.8:53Requestwww.moscow-post.suIN AResponsewww.moscow-post.suIN A185.71.67.60
-
Remote address:8.8.8.8:53Requestwww.moscow-post.suIN A
-
Remote address:185.71.67.60:80RequestGET /xaoniu/server/waungowangued/g.php HTTP/1.1
Connection: Keep-Alive
Cache-Control: no-cache
Host: www.moscow-post.su
ResponseHTTP/1.1 200 OK
Date: Wed, 03 Jan 2024 14:46:37 GMT
Content-Length: 13510
Connection: keep-alive
Set-Cookie: __js_p_=197,1800,0,0,0; Path=/
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
-
Remote address:185.71.67.60:80RequestGET /request/ HTTP/1.1
Host: www.moscow-post.su
Cache-Control: no-cache
Cookie: __js_p_=197,1800,0,0,0
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Date: Wed, 03 Jan 2024 14:46:39 GMT
Content-Length: 13510
Connection: keep-alive
Set-Cookie: __js_p_=199,1800,0,0,0; Path=/
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
-
1.7kB 2.7kB 15 15
HTTP Request
GET http://moscow-post.com/xaoniu/server/waungowangued/g.phpHTTP Response
302HTTP Request
GET http://moscow-post.com/xaoniu/server/waungowangued/g.phpHTTP Response
301HTTP Request
GET http://moscow-post.com/requestHTTP Response
301HTTP Request
GET http://moscow-post.com/request/HTTP Response
301 -
981 B 1.6kB 12 11
HTTP Request
GET http://www.moscow-post.com/xaoniu/server/waungowangued/g.phpHTTP Response
301HTTP Request
GET http://www.moscow-post.com/request/HTTP Response
301 -
1.7kB 30.6kB 24 28
HTTP Request
GET http://www.moscow-post.su/xaoniu/server/waungowangued/g.phpHTTP Response
200HTTP Request
GET http://www.moscow-post.su/request/HTTP Response
200
-
61 B 77 B 1 1
DNS Request
moscow-post.com
DNS Response
185.71.67.60
-
130 B 81 B 2 1
DNS Request
www.moscow-post.com
DNS Request
www.moscow-post.com
DNS Response
185.71.67.60
-
128 B 80 B 2 1
DNS Request
www.moscow-post.su
DNS Request
www.moscow-post.su
DNS Response
185.71.67.60
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\41AKTQO.exe
Filesize159KB
MD5a103174262d8c3fd501ffb95323c60b1
SHA1e40f0dd566ba3d50886d3f9e82bf2c108370d62b
SHA256bc65e75fcfee4ff9655005f8496f7c86feb892f0caec33c2208e8381cb967248
SHA512a023dd3997474d427d963a23ccbe7091fdda53d8fde1e1c43eb2e67090a27bd1b0f9eee08757993125cfe10683c38ab0db2194a5847ff51e39d636357c381da2