Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04/04/2024, 23:09 UTC

General

  • Target

    processlassosetup64.exe

  • Size

    4.9MB

  • MD5

    611e8af3116aa80fafc76d0501fd172e

  • SHA1

    0a82193d9485da25f424c6ff28bdde597fe023a6

  • SHA256

    8faff89242e941f569ee0852ba3463f26741d68b22627d11555b6cee5ef27676

  • SHA512

    1ad6fa695b89e9436c3953609337adfa01f6436e3714bc9268c2a3252fb967d9916c121c611f7416d5fe265a46f5fe891f07d02a02d27a8d6664a2fc0705acb3

  • SSDEEP

    6144:1Ss9IYGOxz2RRKOOCxU873xCswRnBOGLeQ5dBRRW6n5FkjdfJauy:t9/X12qOOCxj3x5whwQl2lauy

Malware Config

Extracted

Family

marsstealer

Botnet

Default

Signatures

  • Mars Stealer

    An infostealer written in C++ based on other infostealers.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\processlassosetup64.exe
    "C:\Users\Admin\AppData\Local\Temp\processlassosetup64.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\ProgramData\IH3A1EL99CR2M.exe
      "C:\ProgramData\IH3A1EL99CR2M.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 728
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2456

Network

  • flag-us
    DNS
    kenesrakishev.net
    IH3A1EL99CR2M.exe
    Remote address:
    8.8.8.8:53
    Request
    kenesrakishev.net
    IN A
    Response
    kenesrakishev.net
    IN A
    173.201.180.75
  • flag-us
    GET
    http://kenesrakishev.net/wp-load.php
    IH3A1EL99CR2M.exe
    Remote address:
    173.201.180.75:80
    Request
    GET /wp-load.php HTTP/1.1
    Host: kenesrakishev.net
    Connection: Keep-Alive
    Cache-Control: no-cache
    Response
    HTTP/1.1 301 Moved Permanently
    Date: Thu, 04 Apr 2024 23:09:28 GMT
    Server: Apache
    Location: https://kenesrakishev.net/wp-load.php
    Content-Length: 245
    Keep-Alive: timeout=5
    Connection: Keep-Alive
    Content-Type: text/html; charset=iso-8859-1
  • flag-us
    GET
    http://kenesrakishev.net/request
    IH3A1EL99CR2M.exe
    Remote address:
    173.201.180.75:80
    Request
    GET /request HTTP/1.1
    Host: kenesrakishev.net
    Cache-Control: no-cache
    Response
    HTTP/1.1 404 Not Found
    Date: Thu, 04 Apr 2024 23:09:30 GMT
    Server: Apache
    Vary: Accept-Encoding,Cookie
    Expires: Wed, 11 Jan 1984 05:00:00 GMT
    Cache-Control: no-cache, must-revalidate, max-age=0
    Link: <https://kenesrakishev.net/wp-json/>; rel="https://api.w.org/"
    Transfer-Encoding: chunked
    Content-Type: text/html; charset=UTF-8
  • flag-us
    GET
    https://kenesrakishev.net/wp-load.php
    IH3A1EL99CR2M.exe
    Remote address:
    173.201.180.75:443
    Request
    GET /wp-load.php HTTP/1.1
    Connection: Keep-Alive
    Cache-Control: no-cache
    Host: kenesrakishev.net
    Response
    HTTP/1.1 200 OK
    Date: Thu, 04 Apr 2024 23:09:30 GMT
    Server: Apache
    Vary: Accept-Encoding,Cookie
    Upgrade: h2,h2c
    Connection: Upgrade, Keep-Alive
    Content-Length: 0
    Keep-Alive: timeout=5
    Content-Type: text/html; charset=UTF-8
  • 173.201.180.75:80
    http://kenesrakishev.net/request
    http
    IH3A1EL99CR2M.exe
    5.7kB
    285.4kB
    121
    212

    HTTP Request

    GET http://kenesrakishev.net/wp-load.php

    HTTP Response

    301

    HTTP Request

    GET http://kenesrakishev.net/request

    HTTP Response

    404
  • 173.201.180.75:443
    https://kenesrakishev.net/wp-load.php
    tls, http
    IH3A1EL99CR2M.exe
    901 B
    4.0kB
    9
    10

    HTTP Request

    GET https://kenesrakishev.net/wp-load.php

    HTTP Response

    200
  • 8.8.8.8:53
    kenesrakishev.net
    dns
    IH3A1EL99CR2M.exe
    63 B
    79 B
    1
    1

    DNS Request

    kenesrakishev.net

    DNS Response

    173.201.180.75

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\IH3A1EL99CR2M.exe

    Filesize

    159KB

    MD5

    3cc6ddf90e7492c803b3d20142b126cc

    SHA1

    9899b9c40227e604131018ca2f812edf2ef5a32b

    SHA256

    49ab6b67e5bc75c556a1a8248f318943bc697209fdac3f02f2721ded1a375897

    SHA512

    df8e9bb2c77ca4b3d7d22fb10adf4a93f23442d1712f5afad9df2b073bd4d95fb2c658844d6d30b86a79bccd44b4dcd491bd7a5a98b78797cd72c8c704ab0ec8

  • memory/2144-0-0x0000000000900000-0x000000000099E000-memory.dmp

    Filesize

    632KB

  • memory/2144-10-0x0000000000620000-0x000000000065D000-memory.dmp

    Filesize

    244KB

  • memory/2144-15-0x0000000000620000-0x000000000065D000-memory.dmp

    Filesize

    244KB

  • memory/2752-16-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2752-17-0x00000000001C0000-0x00000000001FD000-memory.dmp

    Filesize

    244KB

  • memory/2752-18-0x00000000001C0000-0x00000000001FD000-memory.dmp

    Filesize

    244KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.