Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/02/2024, 11:15

General

  • Target

    Shaderium.exe

  • Size

    154.5MB

  • MD5

    e761adc186e90af3b697917e3ca0e912

  • SHA1

    65e121f25ccb6092ede9520bccc9262561efcdc3

  • SHA256

    5b0f51c83aa249f49e19f0ad37f8bfb7948bd0b34c91aee4913e514120c548d9

  • SHA512

    9b155c83642a3f9abe4b27dd616d412886f11577cb6a1fd3f10724c6231d2d941eb2ecc334500d6566aa4e0d0c970f80d2deee54439f6a9af59a6010335b7d6c

  • SSDEEP

    1572864:CCquurbtqKajQe7vqrTU4PrCsdCXrBngPE1cG7VOWe2IkBmUgq3Fd6iU3x6VCdbm:oDAgZi

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Shaderium.exe
    "C:\Users\Admin\AppData\Local\Temp\Shaderium.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4508
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4864
      • C:\Windows\system32\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:1108
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Windows\system32\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:3112
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,112,240,95,87,250,223,237,77,169,2,16,229,9,156,23,119,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,165,87,229,3,160,41,10,82,222,248,24,15,179,155,154,179,80,92,200,10,79,22,207,17,115,218,233,129,21,228,103,6,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,187,28,28,186,138,41,93,144,72,10,58,171,163,138,123,27,41,245,91,217,183,116,88,21,244,63,108,204,3,100,133,138,48,0,0,0,44,127,142,124,136,222,222,149,148,135,203,192,220,143,200,174,108,172,187,166,209,86,218,102,230,36,30,249,11,113,79,213,97,2,36,69,233,134,59,26,77,168,11,141,189,67,40,205,64,0,0,0,133,221,42,151,38,199,209,101,208,97,147,129,238,4,228,208,19,238,225,170,53,34,28,222,15,161,48,118,58,24,167,65,169,13,181,146,21,212,56,88,6,236,81,226,239,162,188,49,237,109,23,200,207,16,212,73,153,175,202,116,74,38,74,209), $null, 'CurrentUser')"
      2⤵
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:2344
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,112,240,95,87,250,223,237,77,169,2,16,229,9,156,23,119,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,165,87,229,3,160,41,10,82,222,248,24,15,179,155,154,179,80,92,200,10,79,22,207,17,115,218,233,129,21,228,103,6,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,187,28,28,186,138,41,93,144,72,10,58,171,163,138,123,27,41,245,91,217,183,116,88,21,244,63,108,204,3,100,133,138,48,0,0,0,44,127,142,124,136,222,222,149,148,135,203,192,220,143,200,174,108,172,187,166,209,86,218,102,230,36,30,249,11,113,79,213,97,2,36,69,233,134,59,26,77,168,11,141,189,67,40,205,64,0,0,0,133,221,42,151,38,199,209,101,208,97,147,129,238,4,228,208,19,238,225,170,53,34,28,222,15,161,48,118,58,24,167,65,169,13,181,146,21,212,56,88,6,236,81,226,239,162,188,49,237,109,23,200,207,16,212,73,153,175,202,116,74,38,74,209), $null, 'CurrentUser')
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4608
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,112,240,95,87,250,223,237,77,169,2,16,229,9,156,23,119,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,255,155,54,165,51,152,175,109,53,207,174,95,5,177,69,174,139,140,68,160,227,255,217,156,252,154,227,236,25,117,120,97,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,61,34,173,89,60,104,183,85,219,40,42,138,21,216,237,59,216,3,33,190,210,11,118,139,17,240,75,119,93,65,153,9,48,0,0,0,20,190,3,130,174,170,86,67,82,31,185,130,251,133,24,113,194,55,160,238,158,200,39,190,121,16,100,180,47,239,93,36,5,186,133,52,114,70,106,234,112,166,41,6,55,209,110,51,64,0,0,0,150,207,209,110,209,230,93,125,73,134,233,12,24,192,19,97,212,54,4,137,19,194,192,9,200,164,25,65,65,85,170,111,53,162,205,193,154,137,215,102,183,45,147,124,30,177,1,65,44,122,124,84,54,223,206,75,97,199,215,120,60,184,157,86), $null, 'CurrentUser')"
      2⤵
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:3572
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,112,240,95,87,250,223,237,77,169,2,16,229,9,156,23,119,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,255,155,54,165,51,152,175,109,53,207,174,95,5,177,69,174,139,140,68,160,227,255,217,156,252,154,227,236,25,117,120,97,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,61,34,173,89,60,104,183,85,219,40,42,138,21,216,237,59,216,3,33,190,210,11,118,139,17,240,75,119,93,65,153,9,48,0,0,0,20,190,3,130,174,170,86,67,82,31,185,130,251,133,24,113,194,55,160,238,158,200,39,190,121,16,100,180,47,239,93,36,5,186,133,52,114,70,106,234,112,166,41,6,55,209,110,51,64,0,0,0,150,207,209,110,209,230,93,125,73,134,233,12,24,192,19,97,212,54,4,137,19,194,192,9,200,164,25,65,65,85,170,111,53,162,205,193,154,137,215,102,183,45,147,124,30,177,1,65,44,122,124,84,54,223,206,75,97,199,215,120,60,184,157,86), $null, 'CurrentUser')
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2236
    • C:\Users\Admin\AppData\Local\Temp\Shaderium.exe
      "C:\Users\Admin\AppData\Local\Temp\Shaderium.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Shaderium" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1828 --field-trial-handle=1972,i,4901835941935218294,7599769409144131216,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
      2⤵
        PID:904
      • C:\Users\Admin\AppData\Local\Temp\Shaderium.exe
        "C:\Users\Admin\AppData\Local\Temp\Shaderium.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Shaderium" --mojo-platform-channel-handle=2272 --field-trial-handle=1972,i,4901835941935218294,7599769409144131216,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
        2⤵
          PID:3424
        • C:\Users\Admin\AppData\Local\Temp\Shaderium.exe
          "C:\Users\Admin\AppData\Local\Temp\Shaderium.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Shaderium" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2544 --field-trial-handle=1972,i,4901835941935218294,7599769409144131216,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
          2⤵
          • Checks computer location settings
          PID:1600

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        3KB

        MD5

        f48896adf9a23882050cdff97f610a7f

        SHA1

        4c5a610df62834d43f470cae7e851946530e3086

        SHA256

        3ae35c2828715a2f9a5531d334a0cfffc81396c2dc058ca42a9943f3cdc22e78

        SHA512

        16644246f2a35a186fcb5c2b6456ed6a16e8db65ad1383109e06547f9b1f9358f071c30cca541ca4cf7bae66cb534535e88f75f6296a4bfc6c7b22b0684a6ba9

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        68d80cc2ac40ea9e5c7297fba6623c45

        SHA1

        05908daef7414f753fa6006082c42485002a7da8

        SHA256

        3b059d656dae93233a96c9079352c1d77c6abfec689cc6236b93b427c9918e96

        SHA512

        2c51e963eba030ee4f2ef5df1577a8ce38cacd6ffc3d0c56258db173352b46cd6048505061c65bd5757d14e2e27d9d396cbce95d58406660af62365bd4e7afb6

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sjyzpu5m.wje.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\b57f7b2d-1a12-4ccf-8e8e-55f8efcff663.tmp.node

        Filesize

        1.8MB

        MD5

        3072b68e3c226aff39e6782d025f25a8

        SHA1

        cf559196d74fa490ac8ce192db222c9f5c5a006a

        SHA256

        7fb52b781709b065c240b6b81394be6e72e53fe11d7c8e0f7b49dd417eb78a01

        SHA512

        61ebc72c20195e99244d95af1ab44fa06201a1aee2b5da04490fdc4312e8324a40b0e15a7b42fab5179753d767c1d08ae1a7a56ac71a6e100e63f83db849ee61

      • C:\Users\Admin\AppData\Local\Temp\cookies.zip

        Filesize

        22B

        MD5

        76cdb2bad9582d23c1f6f4d868218d6c

        SHA1

        b04f3ee8f5e43fa3b162981b50bb72fe1acabb33

        SHA256

        8739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85

        SHA512

        5e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f

      • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • C:\Users\Admin\AppData\Roaming\Shaderium\GPUCache\data_0

        Filesize

        8KB

        MD5

        cf89d16bb9107c631daabf0c0ee58efb

        SHA1

        3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

        SHA256

        d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

        SHA512

        8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

      • C:\Users\Admin\AppData\Roaming\Shaderium\GPUCache\data_1

        Filesize

        264KB

        MD5

        479293e728e756360e442995818aa630

        SHA1

        27021d8f1fd2a06e0a3e980a039f9457c0c8fa0a

        SHA256

        b2486f93607223aadd8413e59f748ab69798d86b5652b57392dfefeed7c03444

        SHA512

        98609653520bb504adf128ae27b7bf1fc28f87222672337dc0675265e5fa7d47c94b3ce9e4c806880dda4fc9fc2cbed15c82deef05758f8e84313bbb207f4b5e

      • C:\Users\Admin\AppData\Roaming\Shaderium\GPUCache\data_2

        Filesize

        8KB

        MD5

        0962291d6d367570bee5454721c17e11

        SHA1

        59d10a893ef321a706a9255176761366115bedcb

        SHA256

        ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

        SHA512

        f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

      • C:\Users\Admin\AppData\Roaming\Shaderium\GPUCache\data_3

        Filesize

        8KB

        MD5

        41876349cb12d6db992f1309f22df3f0

        SHA1

        5cf26b3420fc0302cd0a71e8d029739b8765be27

        SHA256

        e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

        SHA512

        e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

      • C:\Users\Admin\AppData\Roaming\Shaderium\Network\Network Persistent State

        Filesize

        502B

        MD5

        832a1564d8fd9faaf97a2524906f6882

        SHA1

        d7441023af5b85765a80a06cf1b32f24a5dbdb9a

        SHA256

        a93597b69c58d98f19d7534daf8e1c11604ee368fc895d5c0dcf9b3c57b93628

        SHA512

        411dcfbc80fffc94ea08f6f56896325acee885279261280f6532844822c6a560991ca8dd9b3cc2dd8167676302837c4525d3391ebfb660aa6d139e9e93138e47

      • C:\Users\Admin\AppData\Roaming\Shaderium\Network\Network Persistent State~RFe59963b.TMP

        Filesize

        59B

        MD5

        2800881c775077e1c4b6e06bf4676de4

        SHA1

        2873631068c8b3b9495638c865915be822442c8b

        SHA256

        226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

        SHA512

        e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

      • C:\Users\Admin\AppData\Roaming\Shaderium\Session Storage\CURRENT

        Filesize

        16B

        MD5

        46295cac801e5d4857d09837238a6394

        SHA1

        44e0fa1b517dbf802b18faf0785eeea6ac51594b

        SHA256

        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

        SHA512

        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

      • memory/2236-34-0x00007FF8EA7D0000-0x00007FF8EB291000-memory.dmp

        Filesize

        10.8MB

      • memory/2236-37-0x000002401B2F0000-0x000002401B300000-memory.dmp

        Filesize

        64KB

      • memory/2236-40-0x00007FF8EA7D0000-0x00007FF8EB291000-memory.dmp

        Filesize

        10.8MB

      • memory/2236-35-0x000002401B2F0000-0x000002401B300000-memory.dmp

        Filesize

        64KB

      • memory/4608-17-0x000001F840CC0000-0x000001F840CD0000-memory.dmp

        Filesize

        64KB

      • memory/4608-6-0x000001F85B370000-0x000001F85B392000-memory.dmp

        Filesize

        136KB

      • memory/4608-16-0x00007FF8EA7D0000-0x00007FF8EB291000-memory.dmp

        Filesize

        10.8MB

      • memory/4608-18-0x000001F85B880000-0x000001F85B8D0000-memory.dmp

        Filesize

        320KB

      • memory/4608-22-0x00007FF8EA7D0000-0x00007FF8EB291000-memory.dmp

        Filesize

        10.8MB