Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 07:07
Static task
static1
Behavioral task
behavioral1
Sample
3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe
Resource
win10v2004-20241007-en
General
-
Target
3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe
-
Size
502KB
-
MD5
f06e4aeb68de3502871c2899e96cd410
-
SHA1
2caf84657845bfe75b60f83f9fa01d1212f8670b
-
SHA256
3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028a
-
SHA512
cc5b94c108300b8eedbdff51d6849683d7ece59c91a6daf2afaeddcb0b8d2cdf214c0bb6751ba158ebdbc3a7cde811eff225947728493c17c61ee87ebae6ced3
-
SSDEEP
12288:EK2bpydeHVFhfXu7UG/SPbc7Rb9CdNGZrKC:EKIydidXfGKwRofGVb
Malware Config
Extracted
stealc
default
http://46.8.231.109
-
url_path
/c4754d4f680ead72.php
Signatures
-
Downloads MZ/PE file
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1776 set thread context of 3948 1776 3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1344 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3948 MSBuild.exe 3948 MSBuild.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1776 wrote to memory of 3948 1776 3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe 83 PID 1776 wrote to memory of 3948 1776 3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe 83 PID 1776 wrote to memory of 3948 1776 3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe 83 PID 1776 wrote to memory of 3948 1776 3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe 83 PID 1776 wrote to memory of 3948 1776 3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe 83 PID 1776 wrote to memory of 3948 1776 3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe 83 PID 1776 wrote to memory of 3948 1776 3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe 83 PID 1776 wrote to memory of 3948 1776 3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe 83 PID 1776 wrote to memory of 3948 1776 3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe 83 PID 3948 wrote to memory of 3084 3948 MSBuild.exe 87 PID 3948 wrote to memory of 3084 3948 MSBuild.exe 87 PID 3948 wrote to memory of 3084 3948 MSBuild.exe 87 PID 3084 wrote to memory of 1344 3084 cmd.exe 89 PID 3084 wrote to memory of 1344 3084 cmd.exe 89 PID 3084 wrote to memory of 1344 3084 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe"C:\Users\Admin\AppData\Local\Temp\3bc752d2803f660c3216bcfa6fcd3cfb03b21b8753d4bec32f4e679af854028aN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" & del "C:\ProgramData\*.dll"" & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\timeout.exetimeout /t 54⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1344
-
-
-