Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
777.exe
Resource
win7-20240704-en
General
-
Target
777.exe
-
Size
419KB
-
MD5
8c73eea8c4a07427bca0223f6cb08310
-
SHA1
4737c39fcc3b2294c4f23ba77f6b234c92be668d
-
SHA256
43f5db59709683d5fa3bab0d8b3c9cffe6500af722e678c795ec383edbf44b08
-
SHA512
3c5499c3c028a2295627bbf51f77be944e30fe49af1b2f4b7b959729162e5a7c4982c559248c9db99f42a966b19806f7dc5c650df17b79498757c88830f5ebec
-
SSDEEP
6144:xDtDv7vYCNMj41PYo1cLZIYcIVuqqi45x1y6GQ5UAxqLGUOaOMNsvXZ2aKYiCWEO:bvYCNM01zYcIVu9l55qLDzVmiCWEO
Malware Config
Extracted
stealc
default
https://steamcommunity.com/profiles/76561198035868993
-
url_path
/43e1e04e93874aba.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3876 set thread context of 4892 3876 777.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 777.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3876 wrote to memory of 4892 3876 777.exe 86 PID 3876 wrote to memory of 4892 3876 777.exe 86 PID 3876 wrote to memory of 4892 3876 777.exe 86 PID 3876 wrote to memory of 4892 3876 777.exe 86 PID 3876 wrote to memory of 4892 3876 777.exe 86 PID 3876 wrote to memory of 4892 3876 777.exe 86 PID 3876 wrote to memory of 4892 3876 777.exe 86 PID 3876 wrote to memory of 4892 3876 777.exe 86 PID 3876 wrote to memory of 4892 3876 777.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\777.exe"C:\Users\Admin\AppData\Local\Temp\777.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4892
-