Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 18:33
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240704-en
5 signatures
150 seconds
General
-
Target
file.exe
-
Size
205KB
-
MD5
1a3ac0bc9af8e3b8cc72caaf6ba88b9f
-
SHA1
885872fa24d22d8b9c118174ed3d7b7419e58fe0
-
SHA256
ab6d864f42680ad444f9a445d3e403cfd1a6355985db933611ec4cb7607b76bf
-
SHA512
a59b1c0530fb8fd2881d605b8513107df79a844d52a754b901b0a027fb197a20ce42ce342155b635f383e4aae52de255355213b14fb479dbf2d533e355af4426
-
SSDEEP
6144:9gPmLyZ30IcCX4PWNlclz7o+pNb6CPSUbv+/QTEO:9gPmLK33X52voGNS2+YTEO
Malware Config
Extracted
Family
stealc
Botnet
default
C2
http://45.152.113.10
Attributes
-
url_path
/92335b4816f77e90.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3068 set thread context of 3052 3068 file.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2544 3068 file.exe 85 PID 3068 wrote to memory of 2544 3068 file.exe 85 PID 3068 wrote to memory of 2544 3068 file.exe 85 PID 3068 wrote to memory of 4924 3068 file.exe 86 PID 3068 wrote to memory of 4924 3068 file.exe 86 PID 3068 wrote to memory of 4924 3068 file.exe 86 PID 3068 wrote to memory of 3052 3068 file.exe 87 PID 3068 wrote to memory of 3052 3068 file.exe 87 PID 3068 wrote to memory of 3052 3068 file.exe 87 PID 3068 wrote to memory of 3052 3068 file.exe 87 PID 3068 wrote to memory of 3052 3068 file.exe 87 PID 3068 wrote to memory of 3052 3068 file.exe 87 PID 3068 wrote to memory of 3052 3068 file.exe 87 PID 3068 wrote to memory of 3052 3068 file.exe 87 PID 3068 wrote to memory of 3052 3068 file.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2544
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4924
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3052
-