Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3Launcher/Launcher.exe
windows10-2004-x64
10Launcher/Launcher.exe
windows11-21h2-x64
10Launcher/libffi-8.dll
windows10-2004-x64
Launcher/libffi-8.dll
windows11-21h2-x64
1Launcher/libssl-3.dll
windows10-2004-x64
1Launcher/libssl-3.dll
windows11-21h2-x64
1Launcher/p...12.dll
windows10-2004-x64
1Launcher/p...12.dll
windows11-21h2-x64
1Launcher/r...ems.js
windows10-2004-x64
3Launcher/r...ems.js
windows11-21h2-x64
3Launcher/r...ter.js
windows10-2004-x64
3Launcher/r...ter.js
windows11-21h2-x64
3Launcher/r...hud.js
windows10-2004-x64
3Launcher/r...hud.js
windows11-21h2-x64
3Launcher/r...nus.js
windows10-2004-x64
3Launcher/r...nus.js
windows11-21h2-x64
3Launcher/r...hud.js
windows10-2004-x64
3Launcher/r...hud.js
windows11-21h2-x64
3Launcher/r...ngs.js
windows10-2004-x64
3Launcher/r...ngs.js
windows11-21h2-x64
3Launcher/r...ols.js
windows10-2004-x64
3Launcher/r...ols.js
windows11-21h2-x64
3Launcher/r...ngs.js
windows10-2004-x64
3Launcher/r...ngs.js
windows11-21h2-x64
3Launcher/s...ols.js
windows10-2004-x64
3Launcher/s...ols.js
windows11-21h2-x64
3Launcher/tk86t.dll
windows10-2004-x64
1Launcher/tk86t.dll
windows11-21h2-x64
1Launcher/v...40.dll
windows10-2004-x64
1Launcher/v...40.dll
windows11-21h2-x64
1Launcher/zlib1.dll
windows10-2004-x64
1Launcher/zlib1.dll
windows11-21h2-x64
1Analysis
-
max time kernel
106s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 18:02
Static task
static1
Behavioral task
behavioral1
Sample
Launcher/Launcher.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Launcher/Launcher.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
Launcher/libffi-8.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Launcher/libffi-8.dll
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
Launcher/libssl-3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
Launcher/libssl-3.dll
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
Launcher/python312.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
Launcher/python312.dll
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
Launcher/resource/scripts/vscripts/_items.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
Launcher/resource/scripts/vscripts/_items.js
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
Launcher/resource/scripts/vscripts/sp/cl_pilot_speedometer.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
Launcher/resource/scripts/vscripts/sp/cl_pilot_speedometer.js
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
Launcher/resource/scripts/vscripts/sp/cl_sp_hud.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
Launcher/resource/scripts/vscripts/sp/cl_sp_hud.js
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
Launcher/resource/scripts/vscripts/ui/_menus.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
Launcher/resource/scripts/vscripts/ui/_menus.js
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
Launcher/resource/scripts/vscripts/ui/menu_advanced_hud.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
Launcher/resource/scripts/vscripts/ui/menu_advanced_hud.js
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
Launcher/resource/scripts/vscripts/ui/menu_audio_settings.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
Launcher/resource/scripts/vscripts/ui/menu_audio_settings.js
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
Launcher/resource/scripts/vscripts/ui/menu_controls.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
Launcher/resource/scripts/vscripts/ui/menu_controls.js
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
Launcher/resource/scripts/vscripts/ui/menu_extra_settings.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
Launcher/resource/scripts/vscripts/ui/menu_extra_settings.js
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
Launcher/scripts/vscripts/ui/menu_controls.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
Launcher/scripts/vscripts/ui/menu_controls.js
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
Launcher/tk86t.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
Launcher/tk86t.dll
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
Launcher/vcruntime140.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
Launcher/vcruntime140.dll
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
Launcher/zlib1.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
Launcher/zlib1.dll
Resource
win11-20240802-en
General
-
Target
Launcher/Launcher.exe
-
Size
810KB
-
MD5
7f3587a7b13053d1a827d74ed6783c59
-
SHA1
f34454fe0873e07a7c45b76173873e88eb7baf35
-
SHA256
cf8a506f3cf42a271bfa342941dfdedf9e05dde1b4061e421df4730d7a0a4c7e
-
SHA512
7da24433f46df699332721e0449f618208b60225d4b4fcd957d40ab2806ca6f0ea65375766a529411f73994b334c83d05c256a6e46a968e2b94d751384c11be8
-
SSDEEP
12288:MVYUeD1zgrmoxdGxa1PI+QDXMZ6GQ6ov2m+UtbVkGDvAd1slDXg:y+1UrmyWalINbQUv2gVbAdgDXg
Malware Config
Extracted
meduza
109.107.181.162
Signatures
-
Meduza Stealer payload 5 IoCs
resource yara_rule behavioral1/memory/1292-32-0x0000000140000000-0x000000014010F000-memory.dmp family_meduza behavioral1/memory/1292-33-0x0000000140000000-0x000000014010F000-memory.dmp family_meduza behavioral1/memory/1292-36-0x0000000140000000-0x000000014010F000-memory.dmp family_meduza behavioral1/memory/1292-29-0x0000000140000000-0x000000014010F000-memory.dmp family_meduza behavioral1/memory/1292-49-0x0000000140000000-0x000000014010F000-memory.dmp family_meduza -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation Launcher.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation updater.exe -
Executes dropped EXE 2 IoCs
pid Process 1332 updater.exe 1292 updater.exe -
Loads dropped DLL 1 IoCs
pid Process 1332 updater.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 updater.exe Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 updater.exe Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 updater.exe Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 updater.exe Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 updater.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 25 api.ipify.org 26 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1332 set thread context of 1292 1332 updater.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launcher.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5072 cmd.exe 1760 PING.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\Launcher\a.exe:extractor.dll updater.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1760 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1292 updater.exe 1292 updater.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2972 Launcher.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2972 wrote to memory of 1332 2972 Launcher.exe 82 PID 2972 wrote to memory of 1332 2972 Launcher.exe 82 PID 1332 wrote to memory of 1292 1332 updater.exe 83 PID 1332 wrote to memory of 1292 1332 updater.exe 83 PID 1332 wrote to memory of 1292 1332 updater.exe 83 PID 1332 wrote to memory of 1292 1332 updater.exe 83 PID 1332 wrote to memory of 1292 1332 updater.exe 83 PID 1332 wrote to memory of 1292 1332 updater.exe 83 PID 1332 wrote to memory of 1292 1332 updater.exe 83 PID 1332 wrote to memory of 1292 1332 updater.exe 83 PID 1332 wrote to memory of 1292 1332 updater.exe 83 PID 1332 wrote to memory of 1292 1332 updater.exe 83 PID 1332 wrote to memory of 1292 1332 updater.exe 83 PID 1332 wrote to memory of 1292 1332 updater.exe 83 PID 1332 wrote to memory of 1292 1332 updater.exe 83 PID 1332 wrote to memory of 1292 1332 updater.exe 83 PID 1332 wrote to memory of 1292 1332 updater.exe 83 PID 1292 wrote to memory of 5072 1292 updater.exe 84 PID 1292 wrote to memory of 5072 1292 updater.exe 84 PID 5072 wrote to memory of 1760 5072 cmd.exe 86 PID 5072 wrote to memory of 1760 5072 cmd.exe 86 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 updater.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 updater.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Launcher\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher\Launcher.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Roaming\NewInstaller27\updater.exe"C:\Users\Admin\AppData\Roaming\NewInstaller27\updater.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Roaming\NewInstaller27\updater.exe"C:\Users\Admin\AppData\Roaming\NewInstaller27\updater.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1292 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\NewInstaller27\updater.exe"4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1760
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5b981f3349142b904aca6a5946b561a58
SHA1cd69f0a129c0f4e3c74c450f392e4a346acf6398
SHA2564bfe78dbea2a20d765c76d90aacdcb14233e3b107d3ec8657f6917b44de07db5
SHA512cbbce177e5751d50dfa179983427af2190d6149b03c77223ff82101255140b48e7911c482752e8e49410714a85419ec9fce406ec6956ad48e4975bef7c47ec68
-
Filesize
1.5MB
MD533ca3159a7da64b6fa10cb9cad45787b
SHA1a2231eaf294c0f2a13ef5a1edaeca67094c85039
SHA2565c84357eb2c09daa6bc1aa3d9d12f8d6809420e6d4613f284427af9ec789d8fe
SHA5124b9c5a2d73214a3840f90a0b99cbeb509c4e227aa6a58544fc38bbfdcc8e4cb69c046521c90f177cda97f58d1f01b83c44566c7a7ce53f7f302c856a9f422945