Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
9Static
static
7DLL/msvcp140d.zip
windows11-21h2-x64
4msvcp140d.dll
windows11-21h2-x64
1DLL/try.exe
windows11-21h2-x64
9DLL/ucrtbased.zip
windows11-21h2-x64
1ucrtbased.dll
windows11-21h2-x64
1DLL/vcrunt...1d.zip
windows11-21h2-x64
1vcruntime140_1d.dll
windows11-21h2-x64
1DLL/vcruntime140d.zip
windows11-21h2-x64
1vcruntime140d.dll
windows11-21h2-x64
1Setup.exe
windows11-21h2-x64
9idman642build17.exe
windows11-21h2-x64
8Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/08/2024, 05:57
Behavioral task
behavioral1
Sample
DLL/msvcp140d.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
msvcp140d.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
DLL/try.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
DLL/ucrtbased.zip
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
ucrtbased.dll
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
DLL/vcruntime140_1d.zip
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
vcruntime140_1d.dll
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
DLL/vcruntime140d.zip
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
vcruntime140d.dll
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
Setup.exe
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
idman642build17.exe
Resource
win11-20240802-en
General
-
Target
Setup.exe
-
Size
1.6MB
-
MD5
f3ec92776e756b393a09b1af72f697c8
-
SHA1
edc146728bc006b76094dd1d21a8217e612bef0f
-
SHA256
fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607
-
SHA512
32ca2c0d48427d5890e3e0af419f554528d9c29b143f4fa19369298a05d05be393914cb602e9069735f8c24793ae2687c773e11954246313f427d0f3135a065d
-
SSDEEP
49152:C85F9jLrmRlBprqFOFtTEO+iaFsvVjrB:C81jPsl32FOrEnF
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 1 IoCs
pid Process 4484 Activator.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: Setup.exe File opened (read-only) \??\F: Setup.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ipinfo.io 7 ipinfo.io 20 ipinfo.io -
Program crash 1 IoCs
pid pid_target Process procid_target 1876 2040 WerFault.exe 80 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Activator.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe 2040 Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2040 wrote to memory of 4484 2040 Setup.exe 85 PID 2040 wrote to memory of 4484 2040 Setup.exe 85 PID 2040 wrote to memory of 4484 2040 Setup.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\Activator.exe"C:\Users\Admin\AppData\Local\Temp\Activator.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 12082⤵
- Program crash
PID:1876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2040 -ip 20401⤵PID:4544
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
194KB
MD52b2204c85f334de4695369f631926664
SHA1f2704bd77341c26f3217cde9d9458b072a550f34
SHA25669db6b1262af756060efd63ca54a933cbec740ac193221a88bbc46df9ac53de9
SHA512e7cfd3d263cb93e06470279fc22fac243080619a12490ba2c3daaeda0cf6b74da095129d38db3180b1c3478d30f96ae8701bb684cca44e40993efeba620aa019