Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 18:33
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240704-en
5 signatures
150 seconds
General
-
Target
file.exe
-
Size
205KB
-
MD5
1a3ac0bc9af8e3b8cc72caaf6ba88b9f
-
SHA1
885872fa24d22d8b9c118174ed3d7b7419e58fe0
-
SHA256
ab6d864f42680ad444f9a445d3e403cfd1a6355985db933611ec4cb7607b76bf
-
SHA512
a59b1c0530fb8fd2881d605b8513107df79a844d52a754b901b0a027fb197a20ce42ce342155b635f383e4aae52de255355213b14fb479dbf2d533e355af4426
-
SSDEEP
6144:9gPmLyZ30IcCX4PWNlclz7o+pNb6CPSUbv+/QTEO:9gPmLK33X52voGNS2+YTEO
Malware Config
Extracted
Family
stealc
Botnet
default
C2
http://45.152.113.10
Attributes
-
url_path
/92335b4816f77e90.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2724 set thread context of 2784 2724 file.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2676 2784 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2840 2724 file.exe 31 PID 2724 wrote to memory of 2840 2724 file.exe 31 PID 2724 wrote to memory of 2840 2724 file.exe 31 PID 2724 wrote to memory of 2840 2724 file.exe 31 PID 2724 wrote to memory of 2840 2724 file.exe 31 PID 2724 wrote to memory of 2840 2724 file.exe 31 PID 2724 wrote to memory of 2840 2724 file.exe 31 PID 2724 wrote to memory of 2784 2724 file.exe 32 PID 2724 wrote to memory of 2784 2724 file.exe 32 PID 2724 wrote to memory of 2784 2724 file.exe 32 PID 2724 wrote to memory of 2784 2724 file.exe 32 PID 2724 wrote to memory of 2784 2724 file.exe 32 PID 2724 wrote to memory of 2784 2724 file.exe 32 PID 2724 wrote to memory of 2784 2724 file.exe 32 PID 2724 wrote to memory of 2784 2724 file.exe 32 PID 2724 wrote to memory of 2784 2724 file.exe 32 PID 2724 wrote to memory of 2784 2724 file.exe 32 PID 2724 wrote to memory of 2784 2724 file.exe 32 PID 2724 wrote to memory of 2784 2724 file.exe 32 PID 2724 wrote to memory of 2784 2724 file.exe 32 PID 2784 wrote to memory of 2676 2784 RegAsm.exe 33 PID 2784 wrote to memory of 2676 2784 RegAsm.exe 33 PID 2784 wrote to memory of 2676 2784 RegAsm.exe 33 PID 2784 wrote to memory of 2676 2784 RegAsm.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2840
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 2523⤵
- Program crash
PID:2676
-
-