Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3Launcher/Launcher.exe
windows10-2004-x64
10Launcher/Launcher.exe
windows11-21h2-x64
10Launcher/libffi-8.dll
windows10-2004-x64
Launcher/libffi-8.dll
windows11-21h2-x64
1Launcher/libssl-3.dll
windows10-2004-x64
1Launcher/libssl-3.dll
windows11-21h2-x64
1Launcher/p...12.dll
windows10-2004-x64
1Launcher/p...12.dll
windows11-21h2-x64
1Launcher/r...ems.js
windows10-2004-x64
3Launcher/r...ems.js
windows11-21h2-x64
3Launcher/r...ter.js
windows10-2004-x64
3Launcher/r...ter.js
windows11-21h2-x64
3Launcher/r...hud.js
windows10-2004-x64
3Launcher/r...hud.js
windows11-21h2-x64
3Launcher/r...nus.js
windows10-2004-x64
3Launcher/r...nus.js
windows11-21h2-x64
3Launcher/r...hud.js
windows10-2004-x64
3Launcher/r...hud.js
windows11-21h2-x64
3Launcher/r...ngs.js
windows10-2004-x64
3Launcher/r...ngs.js
windows11-21h2-x64
3Launcher/r...ols.js
windows10-2004-x64
3Launcher/r...ols.js
windows11-21h2-x64
3Launcher/r...ngs.js
windows10-2004-x64
3Launcher/r...ngs.js
windows11-21h2-x64
3Launcher/s...ols.js
windows10-2004-x64
3Launcher/s...ols.js
windows11-21h2-x64
3Launcher/tk86t.dll
windows10-2004-x64
1Launcher/tk86t.dll
windows11-21h2-x64
1Launcher/v...40.dll
windows10-2004-x64
1Launcher/v...40.dll
windows11-21h2-x64
1Launcher/zlib1.dll
windows10-2004-x64
1Launcher/zlib1.dll
windows11-21h2-x64
1Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/10/2024, 18:02
Static task
static1
Behavioral task
behavioral1
Sample
Launcher/Launcher.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Launcher/Launcher.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
Launcher/libffi-8.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Launcher/libffi-8.dll
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
Launcher/libssl-3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
Launcher/libssl-3.dll
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
Launcher/python312.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
Launcher/python312.dll
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
Launcher/resource/scripts/vscripts/_items.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
Launcher/resource/scripts/vscripts/_items.js
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
Launcher/resource/scripts/vscripts/sp/cl_pilot_speedometer.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
Launcher/resource/scripts/vscripts/sp/cl_pilot_speedometer.js
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
Launcher/resource/scripts/vscripts/sp/cl_sp_hud.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
Launcher/resource/scripts/vscripts/sp/cl_sp_hud.js
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
Launcher/resource/scripts/vscripts/ui/_menus.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
Launcher/resource/scripts/vscripts/ui/_menus.js
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
Launcher/resource/scripts/vscripts/ui/menu_advanced_hud.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
Launcher/resource/scripts/vscripts/ui/menu_advanced_hud.js
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
Launcher/resource/scripts/vscripts/ui/menu_audio_settings.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
Launcher/resource/scripts/vscripts/ui/menu_audio_settings.js
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
Launcher/resource/scripts/vscripts/ui/menu_controls.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
Launcher/resource/scripts/vscripts/ui/menu_controls.js
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
Launcher/resource/scripts/vscripts/ui/menu_extra_settings.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
Launcher/resource/scripts/vscripts/ui/menu_extra_settings.js
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
Launcher/scripts/vscripts/ui/menu_controls.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
Launcher/scripts/vscripts/ui/menu_controls.js
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
Launcher/tk86t.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
Launcher/tk86t.dll
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
Launcher/vcruntime140.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
Launcher/vcruntime140.dll
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
Launcher/zlib1.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
Launcher/zlib1.dll
Resource
win11-20240802-en
General
-
Target
Launcher/Launcher.exe
-
Size
810KB
-
MD5
7f3587a7b13053d1a827d74ed6783c59
-
SHA1
f34454fe0873e07a7c45b76173873e88eb7baf35
-
SHA256
cf8a506f3cf42a271bfa342941dfdedf9e05dde1b4061e421df4730d7a0a4c7e
-
SHA512
7da24433f46df699332721e0449f618208b60225d4b4fcd957d40ab2806ca6f0ea65375766a529411f73994b334c83d05c256a6e46a968e2b94d751384c11be8
-
SSDEEP
12288:MVYUeD1zgrmoxdGxa1PI+QDXMZ6GQ6ov2m+UtbVkGDvAd1slDXg:y+1UrmyWalINbQUv2gVbAdgDXg
Malware Config
Extracted
meduza
109.107.181.162
Signatures
-
Meduza Stealer payload 5 IoCs
resource yara_rule behavioral2/memory/1752-35-0x0000000140000000-0x000000014010F000-memory.dmp family_meduza behavioral2/memory/1752-39-0x0000000140000000-0x000000014010F000-memory.dmp family_meduza behavioral2/memory/1752-34-0x0000000140000000-0x000000014010F000-memory.dmp family_meduza behavioral2/memory/1752-31-0x0000000140000000-0x000000014010F000-memory.dmp family_meduza behavioral2/memory/1752-50-0x0000000140000000-0x000000014010F000-memory.dmp family_meduza -
Executes dropped EXE 2 IoCs
pid Process 4992 updater.exe 1752 updater.exe -
Loads dropped DLL 1 IoCs
pid Process 4992 updater.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 updater.exe Key opened \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 updater.exe Key opened \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 updater.exe Key opened \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 updater.exe Key opened \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 updater.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 api.ipify.org 6 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4992 set thread context of 1752 4992 updater.exe 79 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launcher.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4340 cmd.exe 3100 PING.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\Launcher\a.exe:extractor.dll updater.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3100 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1752 updater.exe 1752 updater.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3716 Launcher.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3716 wrote to memory of 4992 3716 Launcher.exe 78 PID 3716 wrote to memory of 4992 3716 Launcher.exe 78 PID 4992 wrote to memory of 1752 4992 updater.exe 79 PID 4992 wrote to memory of 1752 4992 updater.exe 79 PID 4992 wrote to memory of 1752 4992 updater.exe 79 PID 4992 wrote to memory of 1752 4992 updater.exe 79 PID 4992 wrote to memory of 1752 4992 updater.exe 79 PID 4992 wrote to memory of 1752 4992 updater.exe 79 PID 4992 wrote to memory of 1752 4992 updater.exe 79 PID 4992 wrote to memory of 1752 4992 updater.exe 79 PID 4992 wrote to memory of 1752 4992 updater.exe 79 PID 4992 wrote to memory of 1752 4992 updater.exe 79 PID 4992 wrote to memory of 1752 4992 updater.exe 79 PID 4992 wrote to memory of 1752 4992 updater.exe 79 PID 4992 wrote to memory of 1752 4992 updater.exe 79 PID 4992 wrote to memory of 1752 4992 updater.exe 79 PID 4992 wrote to memory of 1752 4992 updater.exe 79 PID 1752 wrote to memory of 4340 1752 updater.exe 80 PID 1752 wrote to memory of 4340 1752 updater.exe 80 PID 4340 wrote to memory of 3100 4340 cmd.exe 82 PID 4340 wrote to memory of 3100 4340 cmd.exe 82 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 updater.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 updater.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Launcher\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher\Launcher.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Roaming\NewInstaller27\updater.exe"C:\Users\Admin\AppData\Roaming\NewInstaller27\updater.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Roaming\NewInstaller27\updater.exe"C:\Users\Admin\AppData\Roaming\NewInstaller27\updater.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1752 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\NewInstaller27\updater.exe"4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3100
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5b981f3349142b904aca6a5946b561a58
SHA1cd69f0a129c0f4e3c74c450f392e4a346acf6398
SHA2564bfe78dbea2a20d765c76d90aacdcb14233e3b107d3ec8657f6917b44de07db5
SHA512cbbce177e5751d50dfa179983427af2190d6149b03c77223ff82101255140b48e7911c482752e8e49410714a85419ec9fce406ec6956ad48e4975bef7c47ec68
-
Filesize
1.5MB
MD533ca3159a7da64b6fa10cb9cad45787b
SHA1a2231eaf294c0f2a13ef5a1edaeca67094c85039
SHA2565c84357eb2c09daa6bc1aa3d9d12f8d6809420e6d4613f284427af9ec789d8fe
SHA5124b9c5a2d73214a3840f90a0b99cbeb509c4e227aa6a58544fc38bbfdcc8e4cb69c046521c90f177cda97f58d1f01b83c44566c7a7ce53f7f302c856a9f422945