Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2025, 19:13
Behavioral task
behavioral1
Sample
0461541abae499104970d012841db7bb7bb02ea1d40d5c295a061b38e6fb7231.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0461541abae499104970d012841db7bb7bb02ea1d40d5c295a061b38e6fb7231.exe
Resource
win10v2004-20250207-en
General
-
Target
0461541abae499104970d012841db7bb7bb02ea1d40d5c295a061b38e6fb7231.exe
-
Size
3.8MB
-
MD5
e91657014183219fd6d6535baae97b7c
-
SHA1
c7b3cf4cd1f6f52ac52b427ad25509dc6c990289
-
SHA256
0461541abae499104970d012841db7bb7bb02ea1d40d5c295a061b38e6fb7231
-
SHA512
69cb9171402023578727a4f7183c24ac63896409a9fefcaad432bde41060bd4c99345865b5b88705297fa91c777f6f3e094d6b522863e628a9ef815730f9c36a
-
SSDEEP
98304:FkqXf0FlL9nrYAWAZi6sfLxkuahjCOeX9YG9see5GnRyCAm0makxH13:FkSIlLtzWAXAkuujCPX9YG9he5GnQCAo
Malware Config
Extracted
stealerium
https://api.telegram.org/bot6926474815:AAFx9tLAnf5OAVQZp2teS3G2_6T1wCP67xM/sendMessage?chat_id=-4224073938
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Stealerium family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 46 4192 Process not Found -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Control Panel\International\Geo\Nation 0461541abae499104970d012841db7bb7bb02ea1d40d5c295a061b38e6fb7231.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
flow ioc 21 raw.githubusercontent.com 22 raw.githubusercontent.com 15 raw.githubusercontent.com 17 raw.githubusercontent.com 18 raw.githubusercontent.com 19 raw.githubusercontent.com 20 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1176 MicrosoftEdgeUpdate.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 60 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 2248 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1064 0461541abae499104970d012841db7bb7bb02ea1d40d5c295a061b38e6fb7231.exe Token: SeDebugPrivilege 2248 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1064 wrote to memory of 1660 1064 0461541abae499104970d012841db7bb7bb02ea1d40d5c295a061b38e6fb7231.exe 92 PID 1064 wrote to memory of 1660 1064 0461541abae499104970d012841db7bb7bb02ea1d40d5c295a061b38e6fb7231.exe 92 PID 1660 wrote to memory of 4576 1660 cmd.exe 94 PID 1660 wrote to memory of 4576 1660 cmd.exe 94 PID 1660 wrote to memory of 2248 1660 cmd.exe 95 PID 1660 wrote to memory of 2248 1660 cmd.exe 95 PID 1660 wrote to memory of 60 1660 cmd.exe 96 PID 1660 wrote to memory of 60 1660 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\0461541abae499104970d012841db7bb7bb02ea1d40d5c295a061b38e6fb7231.exe"C:\Users\Admin\AppData\Local\Temp\0461541abae499104970d012841db7bb7bb02ea1d40d5c295a061b38e6fb7231.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\c33662eb-317e-4df1-bc42-a1b91879333d.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:4576
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 10643⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:60
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI3IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY0MzMiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODc1OTU2NTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTcwMzY1NTM1Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58126083991a0985d94e74babca0cd155
SHA1cc1020a4a90effe2ca030e123e16016f6675016f
SHA2560233084cb87e4025102f124aee326eea146647f1d7e58df075a2413eeae96d46
SHA5122983db68a2c1fd3a6a5d344108a608020485174fbf3c6d1002f3b7c4dbdf0df4fcd5996b177fac1762c90d47fab4aba3b5e04d3bb529b2aef36db862c05a1d89