Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
81s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 07:07
Static task
static1
Behavioral task
behavioral1
Sample
3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe
Resource
win10v2004-20241007-en
General
-
Target
3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe
-
Size
502KB
-
MD5
f06e4aeb68de3502871c2899e96cd410
-
SHA1
2caf84657845bfe75b60f83f9fa01d1212f8670b
-
SHA256
3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028a
-
SHA512
cc5b94c108300b8eedbdff51d6849683d7ece59c91a6daf2afaeddcb0b8d2cdf214c0bb6751ba158ebdbc3a7cde811eff225947728493c17c61ee87ebae6ced3
-
SSDEEP
12288:EK2bpydeHVFhfXu7UG/SPbc7Rb9CdNGZrKC:EKIydidXfGKwRofGVb
Malware Config
Extracted
stealc
default
http://46.8.231.109
-
url_path
/c4754d4f680ead72.php
Signatures
-
Downloads MZ/PE file
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1508 set thread context of 2976 1508 3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1408 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2976 MSBuild.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2976 1508 3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe 31 PID 1508 wrote to memory of 2976 1508 3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe 31 PID 1508 wrote to memory of 2976 1508 3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe 31 PID 1508 wrote to memory of 2976 1508 3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe 31 PID 1508 wrote to memory of 2976 1508 3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe 31 PID 1508 wrote to memory of 2976 1508 3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe 31 PID 1508 wrote to memory of 2976 1508 3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe 31 PID 1508 wrote to memory of 2976 1508 3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe 31 PID 1508 wrote to memory of 2976 1508 3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe 31 PID 1508 wrote to memory of 2976 1508 3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe 31 PID 2976 wrote to memory of 2580 2976 MSBuild.exe 32 PID 2976 wrote to memory of 2580 2976 MSBuild.exe 32 PID 2976 wrote to memory of 2580 2976 MSBuild.exe 32 PID 2976 wrote to memory of 2580 2976 MSBuild.exe 32 PID 2580 wrote to memory of 1408 2580 cmd.exe 34 PID 2580 wrote to memory of 1408 2580 cmd.exe 34 PID 2580 wrote to memory of 1408 2580 cmd.exe 34 PID 2580 wrote to memory of 1408 2580 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe"C:\Users\Admin\AppData\Local\Temp\3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" & del "C:\ProgramData\*.dll"" & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\timeout.exetimeout /t 54⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1408
-
-
-