Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2024, 22:18
Static task
static1
Behavioral task
behavioral1
Sample
deeplsetup64.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
deeplsetup64.exe
Resource
win10v2004-20240226-en
General
-
Target
deeplsetup64.exe
-
Size
14.5MB
-
MD5
1dba954b14bc941c13917462e368c560
-
SHA1
ab9eaf52b10a9d270ba0776087456f55ca10c447
-
SHA256
5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396
-
SHA512
e952f7d9fdfc63233ed2592251c68d6bb631b80d586a8349731f858e8c4dca266a91c4db2a042df2accdab30044d3f4b5a3517d0ec1f130080609007ef268167
-
SSDEEP
12288:Mi2f75WQGH5Tua5O7g8+V9rI0djHf1lwNfUNq71j8/37vXu:V8YZO2j3I0dP7P
Malware Config
Extracted
marsstealer
Default
kenesrakishev.net/wp-includes/pomo/po.php
Signatures
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation deeplsetup64.exe -
Executes dropped EXE 1 IoCs
pid Process 4864 IP0EB0EM7WZGA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3924 4864 WerFault.exe 89 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4064 wrote to memory of 4864 4064 deeplsetup64.exe 89 PID 4064 wrote to memory of 4864 4064 deeplsetup64.exe 89 PID 4064 wrote to memory of 4864 4064 deeplsetup64.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\deeplsetup64.exe"C:\Users\Admin\AppData\Local\Temp\deeplsetup64.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\ProgramData\IP0EB0EM7WZGA.exe"C:\ProgramData\IP0EB0EM7WZGA.exe"2⤵
- Executes dropped EXE
PID:4864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 18683⤵
- Program crash
PID:3924
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4864 -ip 48641⤵PID:3220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159KB
MD51a9fa43be1579005d913413d18f047b7
SHA1a92faa80014713989cd2c527d0bc7dd0991d90a4
SHA25630a9559298fd9d27a75bd6b5a73b762ac997992f677a0081d7fb87b74c00eff1
SHA512e52d2f06d9a424e0ded2943e43d07e8ac40ee85f8cb10c90d88abf7482046f38c2d8580055cf211094f1274c930061c889480ffade363cf1b6eee57def259dbd