Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 06:09
Static task
static1
Behavioral task
behavioral1
Sample
AeroGlassEffect_By i_placebo.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
AeroGlassEffect_By i_placebo.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
visual_viewer.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
visual_viewer.dll
Resource
win10v2004-20240412-en
General
-
Target
AeroGlassEffect_By i_placebo.exe
-
Size
508KB
-
MD5
ecdf21a9102e05d26c2404d7ff86d027
-
SHA1
889228e574a50a3d2f9b1167cb85b1e797cc7817
-
SHA256
6447a2ddb0f3f147c1ade93d8f47cb49da71820137188d1fcce57e0007b99c69
-
SHA512
398242d51c027b36810be60677d74d5320a390406ad4c7ba848dce88a819dacd3187efc84ee3a84e1fd3b070347c4df36bcfefc3b7b756feb69acf8ca5e6f513
-
SSDEEP
12288:UstKi/CYqICxr0BnVIPm1/rF/UhoNieeAssK7slfl3wFBD:5Ki/CXICx0+m1B/eoNiee8
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" AeroGlassEffect_By i_placebo.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2700 winlogon.exe -
Loads dropped DLL 2 IoCs
pid Process 836 AeroGlassEffect_By i_placebo.exe 836 AeroGlassEffect_By i_placebo.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\runAPI87 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\runAPI69.exe\"" AeroGlassEffect_By i_placebo.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 836 set thread context of 2700 836 AeroGlassEffect_By i_placebo.exe 28 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\LimeWire\Shared\Steam-Hack.exe AeroGlassEffect_By i_placebo.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 836 wrote to memory of 2700 836 AeroGlassEffect_By i_placebo.exe 28 PID 836 wrote to memory of 2700 836 AeroGlassEffect_By i_placebo.exe 28 PID 836 wrote to memory of 2700 836 AeroGlassEffect_By i_placebo.exe 28 PID 836 wrote to memory of 2700 836 AeroGlassEffect_By i_placebo.exe 28 PID 836 wrote to memory of 2700 836 AeroGlassEffect_By i_placebo.exe 28 PID 836 wrote to memory of 2700 836 AeroGlassEffect_By i_placebo.exe 28 PID 836 wrote to memory of 2700 836 AeroGlassEffect_By i_placebo.exe 28 PID 836 wrote to memory of 2700 836 AeroGlassEffect_By i_placebo.exe 28 PID 836 wrote to memory of 2700 836 AeroGlassEffect_By i_placebo.exe 28 PID 836 wrote to memory of 2700 836 AeroGlassEffect_By i_placebo.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\AeroGlassEffect_By i_placebo.exe"C:\Users\Admin\AppData\Local\Temp\AeroGlassEffect_By i_placebo.exe"1⤵
- Disables RegEdit via registry modification
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\winlogon.exeC:\Users\Admin\AppData\Local\Temp\winlogon.exe2⤵
- Executes dropped EXE
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5d79efb472a22ad75d501317b21e66b5e
SHA124512f54884d3dda2d803457bbd3dcd513356196
SHA2567255b1d1f001b9d9a5177e1f8063bcc824effe3570e6c19508babe12bb73c7d6
SHA5127c5a2f516a727ddeb05f9a7c6565375debb05709ac9b95212fc748cba37a2ab81b7d727636141096e4511679ce140b07b37fdf36cfb47d8d1c8accdd24163ae5