Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 11:38
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240802-en
General
-
Target
file.exe
-
Size
206KB
-
MD5
4577f74ecd5c343bf097f627c7fdf868
-
SHA1
1d5d68fd676ba379c899613f4f16bc8b28594f75
-
SHA256
ec194b4917fd62caf00c742b4182bbce64b8e7e923ed43278fd11019ad9a1b42
-
SHA512
22e8ea279a00ba57274c314e21329aaae6f6d91e102469927be75a7caa93f1a2b8cbbbd36165e8a6e16b7b511a8e12e49dae4d52ab1e77746fea5972773aeea6
-
SSDEEP
6144:dk0CrnfGXbw2E122NCyFBM/8MCsOaqXd35beWzEkrXW6EO:d+fGXbPMNCwM0lRaUd3YoE0hEO
Malware Config
Extracted
stealc
default
http://46.8.231.109
-
url_path
/c4754d4f680ead72.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1780 set thread context of 1096 1780 file.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2800 1096 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1780 wrote to memory of 1096 1780 file.exe 32 PID 1780 wrote to memory of 1096 1780 file.exe 32 PID 1780 wrote to memory of 1096 1780 file.exe 32 PID 1780 wrote to memory of 1096 1780 file.exe 32 PID 1780 wrote to memory of 1096 1780 file.exe 32 PID 1780 wrote to memory of 1096 1780 file.exe 32 PID 1780 wrote to memory of 1096 1780 file.exe 32 PID 1780 wrote to memory of 1096 1780 file.exe 32 PID 1780 wrote to memory of 1096 1780 file.exe 32 PID 1780 wrote to memory of 1096 1780 file.exe 32 PID 1780 wrote to memory of 1096 1780 file.exe 32 PID 1780 wrote to memory of 1096 1780 file.exe 32 PID 1780 wrote to memory of 1096 1780 file.exe 32 PID 1096 wrote to memory of 2800 1096 RegAsm.exe 33 PID 1096 wrote to memory of 2800 1096 RegAsm.exe 33 PID 1096 wrote to memory of 2800 1096 RegAsm.exe 33 PID 1096 wrote to memory of 2800 1096 RegAsm.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 2523⤵
- Program crash
PID:2800
-
-