Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

24/02/2024, 11:35

240224-np5xdsad75 3

24/02/2024, 11:32

240224-nnbxxsbb2x 3

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2024, 11:35

General

  • Target

    stealerchecker.exe

  • Size

    68KB

  • MD5

    29ad87193b4efc50d31fe9077dc814ca

  • SHA1

    d946c00a35279a6414867f218785faf986e294ea

  • SHA256

    8274f1591c7dfe5a492d2d5691e0a73a2ce4ff11cc6931551c7911d1e73a3a8d

  • SHA512

    50840ed705bd7b6f1911fd74c8a23f0ef528103b7a83bc92cb7eea688d48f54390e0e1aded2ede3ec6fcae084492259ababd3de22afee6a89ac7e907a87573d1

  • SSDEEP

    1536:UkKPK681qM5GckK6vk5i2laAmMlghXx+xUtYc9gi:JkvemMlghXx+xUtYc9gi

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\stealerchecker.exe
    "C:\Users\Admin\AppData\Local\Temp\stealerchecker.exe"
    1⤵
      PID:1252
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 804
        2⤵
        • Program crash
        PID:4256
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1252 -ip 1252
      1⤵
        PID:1548
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /4
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:5088
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /4
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4448

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx

        Filesize

        64KB

        MD5

        d2fb266b97caff2086bf0fa74eddb6b2

        SHA1

        2f0061ce9c51b5b4fbab76b37fc6a540be7f805d

        SHA256

        b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a

        SHA512

        c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8

      • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock

        Filesize

        4B

        MD5

        f49655f856acb8884cc0ace29216f511

        SHA1

        cb0f1f87ec0455ec349aaa950c600475ac7b7b6b

        SHA256

        7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba

        SHA512

        599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8

      • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val

        Filesize

        944B

        MD5

        6bd369f7c74a28194c991ed1404da30f

        SHA1

        0f8e3f8ab822c9374409fe399b6bfe5d68cbd643

        SHA256

        878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d

        SHA512

        8fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93

      • memory/1252-0-0x0000000000840000-0x0000000000858000-memory.dmp

        Filesize

        96KB

      • memory/1252-1-0x0000000074AA0000-0x0000000075250000-memory.dmp

        Filesize

        7.7MB

      • memory/1252-2-0x0000000074AA0000-0x0000000075250000-memory.dmp

        Filesize

        7.7MB

      • memory/4448-28-0x00000260D58C0000-0x00000260D58C1000-memory.dmp

        Filesize

        4KB

      • memory/4448-25-0x00000260D58C0000-0x00000260D58C1000-memory.dmp

        Filesize

        4KB

      • memory/4448-24-0x00000260D58C0000-0x00000260D58C1000-memory.dmp

        Filesize

        4KB

      • memory/4448-23-0x00000260D58C0000-0x00000260D58C1000-memory.dmp

        Filesize

        4KB

      • memory/4448-26-0x00000260D58C0000-0x00000260D58C1000-memory.dmp

        Filesize

        4KB

      • memory/4448-27-0x00000260D58C0000-0x00000260D58C1000-memory.dmp

        Filesize

        4KB

      • memory/4448-18-0x00000260D58C0000-0x00000260D58C1000-memory.dmp

        Filesize

        4KB

      • memory/4448-16-0x00000260D58C0000-0x00000260D58C1000-memory.dmp

        Filesize

        4KB

      • memory/4448-17-0x00000260D58C0000-0x00000260D58C1000-memory.dmp

        Filesize

        4KB

      • memory/5088-9-0x00000266727F0000-0x00000266727F1000-memory.dmp

        Filesize

        4KB

      • memory/5088-15-0x00000266727F0000-0x00000266727F1000-memory.dmp

        Filesize

        4KB

      • memory/5088-14-0x00000266727F0000-0x00000266727F1000-memory.dmp

        Filesize

        4KB

      • memory/5088-13-0x00000266727F0000-0x00000266727F1000-memory.dmp

        Filesize

        4KB

      • memory/5088-12-0x00000266727F0000-0x00000266727F1000-memory.dmp

        Filesize

        4KB

      • memory/5088-11-0x00000266727F0000-0x00000266727F1000-memory.dmp

        Filesize

        4KB

      • memory/5088-10-0x00000266727F0000-0x00000266727F1000-memory.dmp

        Filesize

        4KB

      • memory/5088-5-0x00000266727F0000-0x00000266727F1000-memory.dmp

        Filesize

        4KB

      • memory/5088-4-0x00000266727F0000-0x00000266727F1000-memory.dmp

        Filesize

        4KB

      • memory/5088-3-0x00000266727F0000-0x00000266727F1000-memory.dmp

        Filesize

        4KB