Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 01:06
Static task
static1
Behavioral task
behavioral1
Sample
19966b573d5fa3317b872b95735f9dfc9c6f473b09283747ccde632db0918fe8.exe
Resource
win7-20240708-en
General
-
Target
19966b573d5fa3317b872b95735f9dfc9c6f473b09283747ccde632db0918fe8.exe
-
Size
22.9MB
-
MD5
e5570649471b03733af5167be3725b6a
-
SHA1
65c5e07b2a7c06128ba519124b0a474dcd47c640
-
SHA256
19966b573d5fa3317b872b95735f9dfc9c6f473b09283747ccde632db0918fe8
-
SHA512
98b6e308b8d978768a20bcfee6431f2b70678d9beaf4b59de0afc6a5687801d70a6a0798a8b6f4351c395535eb4ca14f5d177b30bba79471f9d6cd153cbb6e9b
-
SSDEEP
98304:8Ee4Iop/Klq6b3coYQUjTPNzO+EbTBVcPAR5Eaf2rVLywF1l05:tKlq6bHFUfPxZJPSae29N1l0
Malware Config
Extracted
stealc
cr1
http://45.152.114.50
-
url_path
/587ec30955d49a9c.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4384 set thread context of 4664 4384 19966b573d5fa3317b872b95735f9dfc9c6f473b09283747ccde632db0918fe8.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4384 wrote to memory of 4664 4384 19966b573d5fa3317b872b95735f9dfc9c6f473b09283747ccde632db0918fe8.exe 92 PID 4384 wrote to memory of 4664 4384 19966b573d5fa3317b872b95735f9dfc9c6f473b09283747ccde632db0918fe8.exe 92 PID 4384 wrote to memory of 4664 4384 19966b573d5fa3317b872b95735f9dfc9c6f473b09283747ccde632db0918fe8.exe 92 PID 4384 wrote to memory of 4664 4384 19966b573d5fa3317b872b95735f9dfc9c6f473b09283747ccde632db0918fe8.exe 92 PID 4384 wrote to memory of 4664 4384 19966b573d5fa3317b872b95735f9dfc9c6f473b09283747ccde632db0918fe8.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\19966b573d5fa3317b872b95735f9dfc9c6f473b09283747ccde632db0918fe8.exe"C:\Users\Admin\AppData\Local\Temp\19966b573d5fa3317b872b95735f9dfc9c6f473b09283747ccde632db0918fe8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- System Location Discovery: System Language Discovery
PID:4664
-