Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2024, 18:04

General

  • Target

    136aff853514ca7aba662cc26bc54cfb92d58e6477752ce3a8948ff9f1117499.exe

  • Size

    414KB

  • MD5

    df1ecb1fc2d0480ef5a0e569543d14e9

  • SHA1

    8c90b5a6caab28b852cde352011752cb2761fdf9

  • SHA256

    136aff853514ca7aba662cc26bc54cfb92d58e6477752ce3a8948ff9f1117499

  • SHA512

    4e8af41bdd90a6a2f2008be558041678608761703bbbd4f08a55ff1305464319bb96cbd53071c71f83a73ee6d1189a3a3aa3c91e69c3aae9626e3e209671aad4

  • SSDEEP

    6144:GaNowv7MR+dM+A4K3Kc8Y2Yem0IuONlLfiFtDgjTUGU6J54:GaNPv7Q+72K4eYrlLQDg0xo4

Score
10/10

Malware Config

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 9 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\136aff853514ca7aba662cc26bc54cfb92d58e6477752ce3a8948ff9f1117499.exe
    "C:\Users\Admin\AppData\Local\Temp\136aff853514ca7aba662cc26bc54cfb92d58e6477752ce3a8948ff9f1117499.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3092
    • C:\Users\Admin\AppData\Local\Temp\u2dw.0.exe
      "C:\Users\Admin\AppData\Local\Temp\u2dw.0.exe"
      2⤵
      • Executes dropped EXE
      PID:368
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 368 -s 1016
        3⤵
        • Program crash
        PID:4868
    • C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe
      "C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3776
      • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exe
        C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1160
        • C:\Users\Admin\AppData\Roaming\Uninstallcheck_alpha\ptInst.exe
          C:\Users\Admin\AppData\Roaming\Uninstallcheck_alpha\ptInst.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1340
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            5⤵
              PID:3656
      • C:\Users\Admin\AppData\Local\Temp\u2dw.1.exe
        "C:\Users\Admin\AppData\Local\Temp\u2dw.1.exe"
        2⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3124
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3092 -s 1040
        2⤵
        • Program crash
        PID:4172
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 368 -ip 368
      1⤵
        PID:216
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3092 -ip 3092
        1⤵
          PID:672

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\33e12ea3

          Filesize

          3.8MB

          MD5

          13418f74a7ce25cdd6997c9fcb718a0e

          SHA1

          f4c880821fee72c37c882b1e8ebf100efcafe31c

          SHA256

          a890935a36903669f35522c85c75e296404a4595453f060398cb64c5b0d6dfd0

          SHA512

          59017162877bbbdf823450a946e3e54e9130d8ebbf5baba24471c68a10d1fad3452be08c693cd7a78d0bf2fcfd6d3086edeec1a379f9b53fd66bb246c128d4c1

        • C:\Users\Admin\AppData\Local\Temp\45e02208

          Filesize

          1.4MB

          MD5

          a78a6ff2569bfa8127bc8030d8c8c4b9

          SHA1

          c878b0112568ddb2d94789d72399a5a6ff743a52

          SHA256

          fa1a5f368edca53f2c5d74a25fb80a0d838f0f2a56cb2038cf0e70d357d62d27

          SHA512

          d348c48aa2ffeaa0c0a7f0707e4c3004e50ab6ef9a2ff836300419fbf40d3b57f179e0134dfa706d5fa97d8ebb7985e87c8fd21d8cab711790dc02fee7c53cc1

        • C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe

          Filesize

          7.6MB

          MD5

          862bf3003dca41d88ac49a6846149623

          SHA1

          b34f1d42dd0649d6b83f9a92124a554f48df0434

          SHA256

          50c10789db130a98c63e6e7f6e23b1c89b38c5ea4678f1e06fd1796fba25c75c

          SHA512

          fe5ab7888633dbfecca57ecd1732360796c2f19c62fc4282e2a92e9b8b440cc01e25b7a0c6a608cf9c2e9c9e3c49a8509a08851afcaef7e1afc21c0abcc2c969

        • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\VCRUNTIME140.dll

          Filesize

          81KB

          MD5

          16b26bc43943531d7d7e379632ed4e63

          SHA1

          565287de39649e59e653a3612478c2186096d70a

          SHA256

          346f72c9a7584c2ab6ce65cd38a616c77ebddc0bbab2274c4e89dd5e62237517

          SHA512

          b5b7b4b8c5ab4276a34956e43f586272b1803ec3609253fee1bcc0a549aed7ba11d47404b023f7b67af701726bab95cca55738e7bd5bca272eca5ac71bb418cc

        • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\WCLDll.dll

          Filesize

          590KB

          MD5

          63206e3b4f1fa4dcfbe1f2cc5d0c4e9d

          SHA1

          fe731b2e9c296d9ecc75ed96c2d29fe46c7cd924

          SHA256

          8f5b8645b5e5ea48acc411b21a1b3cd56d2660ac931989b9f064c8ff82039885

          SHA512

          32bdcce9e8e7f1ebe50e114f65f762391d52f482a112515ccb16b09653b93873528ea1a7473a2512075bf8f729997a65f455bf6599482e997b85e06a2f87f3d6

        • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\cosmetician.mpeg

          Filesize

          79KB

          MD5

          8e1bbc6d6c4d207393b59853f73945ae

          SHA1

          b66d632eae41267175bf5332d43a785dd929d79f

          SHA256

          b04725aaa99b27e04c02bec7d98fb4511331ea53761272325fff9c27a679e279

          SHA512

          1b45a7be00f54498df289641745ca6ee99e11d63100fb838b96c2d9412f8b5f0ea5aa8b964f32a4f9182cd599765f5ca08b91e8e8eecd06d1c53543284a59001

        • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\msvcp140.dll

          Filesize

          427KB

          MD5

          71a0aa2d05e9174cefd568347bd9c70f

          SHA1

          cb9247a0fa59e47f72df7d1752424b33a903bbb2

          SHA256

          fdb3d86c512adff90967cb860d02a4682850ab96727f0376e4d4836504c50e47

          SHA512

          6e65520528facaa4058720eb16d6bfdcc7bb36923b7e8e6551f3526709f0fabafab123999e618438e6abe7efed4a1332547cfc988f2b24b0e3d91198b95a911a

        • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exe

          Filesize

          938KB

          MD5

          b15bac961f62448c872e1dc6d3931016

          SHA1

          1dcb61babb08fe5db711e379cb67335357a5db82

          SHA256

          bf1a0c67b433f52ebd304553f022baa34bfbca258c932d2b4b8b956b1467bfa5

          SHA512

          932119f7dc6710239481c80ad8baaed5c14a2085fcc514b6522671b1a4ebbaf488e43453f11d5aaf6dcef7a245db8de44d93ff255f7cf8385b7d00f31f2cc370

        • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\quersprung.vhd

          Filesize

          1.3MB

          MD5

          3bee67dd0e04559c8fdc7761336dee47

          SHA1

          027ef9dca01fb928db79e57b418130165f06ed5f

          SHA256

          57745aba2885cf8bf770e7e9195697c05e35333417ca23af153367bf31cbf812

          SHA512

          35fb66f98a57b0d14c3044a91abac3e0670d516edfd691d6670df034e8454c550d3d2e702ab90cd32b70fcba8aeb2e02b7b3a07b6a340a932738968473f77dce

        • C:\Users\Admin\AppData\Local\Temp\u2dw.0.exe

          Filesize

          270KB

          MD5

          8ed49d27b8ccab5a03e6e822694fdaa1

          SHA1

          cf47d93e906e3f93329ceeedd061be95c4b1047b

          SHA256

          7ee946a36cdb7fa51dae1b2fc51ab628a7c7af1a01446c0413c0fba6aaff9a77

          SHA512

          551ca597962d6b818e31fc7a414a7dc62e981672092a12a282a6549573138e460187df8339582c6f52f204752c00047b39b6a33ccc546d194ccc8731fcf94512

        • C:\Users\Admin\AppData\Local\Temp\u2dw.1.exe

          Filesize

          4.6MB

          MD5

          397926927bca55be4a77839b1c44de6e

          SHA1

          e10f3434ef3021c399dbba047832f02b3c898dbd

          SHA256

          4f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7

          SHA512

          cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954

        • memory/368-16-0x0000000000400000-0x0000000002C26000-memory.dmp

          Filesize

          40.1MB

        • memory/368-15-0x0000000000400000-0x0000000002C26000-memory.dmp

          Filesize

          40.1MB

        • memory/368-14-0x0000000002FA0000-0x0000000002FC7000-memory.dmp

          Filesize

          156KB

        • memory/368-13-0x0000000002D60000-0x0000000002E60000-memory.dmp

          Filesize

          1024KB

        • memory/1160-78-0x0000000072970000-0x0000000072AEB000-memory.dmp

          Filesize

          1.5MB

        • memory/1160-79-0x00007FFA6CA70000-0x00007FFA6CC65000-memory.dmp

          Filesize

          2.0MB

        • memory/1340-99-0x0000000072970000-0x0000000072AEB000-memory.dmp

          Filesize

          1.5MB

        • memory/1340-100-0x00007FFA6CA70000-0x00007FFA6CC65000-memory.dmp

          Filesize

          2.0MB

        • memory/1340-109-0x0000000072970000-0x0000000072AEB000-memory.dmp

          Filesize

          1.5MB

        • memory/1340-125-0x0000000072970000-0x0000000072AEB000-memory.dmp

          Filesize

          1.5MB

        • memory/3092-19-0x0000000003130000-0x000000000319E000-memory.dmp

          Filesize

          440KB

        • memory/3092-17-0x0000000000400000-0x0000000002C4A000-memory.dmp

          Filesize

          40.3MB

        • memory/3092-56-0x0000000000400000-0x0000000002C4A000-memory.dmp

          Filesize

          40.3MB

        • memory/3092-2-0x0000000003130000-0x000000000319E000-memory.dmp

          Filesize

          440KB

        • memory/3092-3-0x0000000000400000-0x0000000002C4A000-memory.dmp

          Filesize

          40.3MB

        • memory/3092-118-0x0000000000400000-0x0000000002C4A000-memory.dmp

          Filesize

          40.3MB

        • memory/3092-20-0x0000000002F30000-0x0000000003030000-memory.dmp

          Filesize

          1024KB

        • memory/3092-1-0x0000000002F30000-0x0000000003030000-memory.dmp

          Filesize

          1024KB

        • memory/3124-113-0x0000000000AC0000-0x0000000000AC1000-memory.dmp

          Filesize

          4KB

        • memory/3656-127-0x0000000072970000-0x0000000072AEB000-memory.dmp

          Filesize

          1.5MB

        • memory/3776-50-0x0000000072970000-0x0000000072AEB000-memory.dmp

          Filesize

          1.5MB

        • memory/3776-44-0x0000000002D50000-0x0000000002D51000-memory.dmp

          Filesize

          4KB

        • memory/3776-43-0x0000000000400000-0x0000000000BEB000-memory.dmp

          Filesize

          7.9MB

        • memory/3776-123-0x0000000072970000-0x0000000072AEB000-memory.dmp

          Filesize

          1.5MB

        • memory/3776-124-0x0000000000400000-0x0000000000BEB000-memory.dmp

          Filesize

          7.9MB

        • memory/3776-65-0x0000000072970000-0x0000000072AEB000-memory.dmp

          Filesize

          1.5MB

        • memory/3776-51-0x00007FFA6CA70000-0x00007FFA6CC65000-memory.dmp

          Filesize

          2.0MB

        • memory/3776-53-0x0000000072970000-0x0000000072AEB000-memory.dmp

          Filesize

          1.5MB