Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
11/08/2024, 21:22
Static task
static1
Behavioral task
behavioral1
Sample
5ACm77MN7q63MOxGPe3CiriK.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5ACm77MN7q63MOxGPe3CiriK.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
5ACm77MN7q63MOxGPe3CiriK.exe
Resource
win10v2004-20240802-en
General
-
Target
5ACm77MN7q63MOxGPe3CiriK.exe
-
Size
206KB
-
MD5
d22f922c9b6e07fc161e1367264e29d8
-
SHA1
f5fe23f6ccb233ddff4b77dc356b01c1c2fc5983
-
SHA256
fc330820899d3b38c7267818e1603b11c5e66b93a7ff5ec649f2ce033c1e3b66
-
SHA512
cd7dd3389cd257a28eaa41232b8641900f77bed5713f3670668c73e4e3c65d899cd54a659fc2391b970718ad4d74f6f015d54ae8c6d75a36d928f750bbff8854
-
SSDEEP
3072:cPa5ECm4gXI65Dk25H3VZISd3j9d0h74X3f7AOi9A82aHFIxiIOuCheHkLXOTKYp:yhlI5293VZIw3JM7U3f1raHFIpURLGEO
Malware Config
Extracted
stealc
kora
http://185.215.113.100
-
url_path
/e2b1563c6670f193.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4808 set thread context of 652 4808 5ACm77MN7q63MOxGPe3CiriK.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ACm77MN7q63MOxGPe3CiriK.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4808 wrote to memory of 652 4808 5ACm77MN7q63MOxGPe3CiriK.exe 81 PID 4808 wrote to memory of 652 4808 5ACm77MN7q63MOxGPe3CiriK.exe 81 PID 4808 wrote to memory of 652 4808 5ACm77MN7q63MOxGPe3CiriK.exe 81 PID 4808 wrote to memory of 652 4808 5ACm77MN7q63MOxGPe3CiriK.exe 81 PID 4808 wrote to memory of 652 4808 5ACm77MN7q63MOxGPe3CiriK.exe 81 PID 4808 wrote to memory of 652 4808 5ACm77MN7q63MOxGPe3CiriK.exe 81 PID 4808 wrote to memory of 652 4808 5ACm77MN7q63MOxGPe3CiriK.exe 81 PID 4808 wrote to memory of 652 4808 5ACm77MN7q63MOxGPe3CiriK.exe 81 PID 4808 wrote to memory of 652 4808 5ACm77MN7q63MOxGPe3CiriK.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ACm77MN7q63MOxGPe3CiriK.exe"C:\Users\Admin\AppData\Local\Temp\5ACm77MN7q63MOxGPe3CiriK.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:652
-