Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2025, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
autoinstall dll @powergirlso2.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
autoinstall dll @powergirlso2.exe
Resource
win10v2004-20250217-en
General
-
Target
autoinstall dll @powergirlso2.exe
-
Size
2.0MB
-
MD5
390e8cf06fa3eb9ebf46ca2498bbe0a7
-
SHA1
cc2ce83fd17f26e8889c94263624b98cd46254d4
-
SHA256
0ba3f53dc303731f8060b81fecfd87026b55052488853f4df228255eeba35a8d
-
SHA512
821d13b2d099736bc9f410ad1138d3bf6c09e2ef0ae93259b937de1b0652eb968a4f097c26006a75f94548ee237989464f5620b86116dc9654fef7e49452d633
-
SSDEEP
24576:xkBGRu7kCvNuLJHCUgGZJkQqRX7usVzRxaiKwr/8jh80trwEuepKunr:6BerzgpKW/8jh86UEke
Malware Config
Extracted
asyncrat
Default
RC7-41750.portmap.host:41750
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Stealerium family
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cvtres.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cvtres.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cvtres.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 34 icanhazip.com 36 ip-api.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4444 set thread context of 4704 4444 autoinstall dll @powergirlso2.exe 89 -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autoinstall dll @powergirlso2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 4644 cmd.exe 4800 netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 cvtres.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier cvtres.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1436 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe 4444 autoinstall dll @powergirlso2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4444 autoinstall dll @powergirlso2.exe Token: SeDebugPrivilege 4704 cvtres.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 4444 wrote to memory of 4704 4444 autoinstall dll @powergirlso2.exe 89 PID 4444 wrote to memory of 4704 4444 autoinstall dll @powergirlso2.exe 89 PID 4444 wrote to memory of 4704 4444 autoinstall dll @powergirlso2.exe 89 PID 4444 wrote to memory of 4704 4444 autoinstall dll @powergirlso2.exe 89 PID 4444 wrote to memory of 4704 4444 autoinstall dll @powergirlso2.exe 89 PID 4444 wrote to memory of 4704 4444 autoinstall dll @powergirlso2.exe 89 PID 4444 wrote to memory of 4704 4444 autoinstall dll @powergirlso2.exe 89 PID 4444 wrote to memory of 4704 4444 autoinstall dll @powergirlso2.exe 89 PID 4444 wrote to memory of 228 4444 autoinstall dll @powergirlso2.exe 90 PID 4444 wrote to memory of 228 4444 autoinstall dll @powergirlso2.exe 90 PID 4444 wrote to memory of 228 4444 autoinstall dll @powergirlso2.exe 90 PID 228 wrote to memory of 1436 228 cmd.exe 92 PID 228 wrote to memory of 1436 228 cmd.exe 92 PID 228 wrote to memory of 1436 228 cmd.exe 92 PID 4704 wrote to memory of 4644 4704 cvtres.exe 94 PID 4704 wrote to memory of 4644 4704 cvtres.exe 94 PID 4704 wrote to memory of 4644 4704 cvtres.exe 94 PID 4644 wrote to memory of 4680 4644 cmd.exe 96 PID 4644 wrote to memory of 4680 4644 cmd.exe 96 PID 4644 wrote to memory of 4680 4644 cmd.exe 96 PID 4644 wrote to memory of 4800 4644 cmd.exe 97 PID 4644 wrote to memory of 4800 4644 cmd.exe 97 PID 4644 wrote to memory of 4800 4644 cmd.exe 97 PID 4644 wrote to memory of 4464 4644 cmd.exe 98 PID 4644 wrote to memory of 4464 4644 cmd.exe 98 PID 4644 wrote to memory of 4464 4644 cmd.exe 98 PID 4704 wrote to memory of 728 4704 cvtres.exe 99 PID 4704 wrote to memory of 728 4704 cvtres.exe 99 PID 4704 wrote to memory of 728 4704 cvtres.exe 99 PID 728 wrote to memory of 1696 728 cmd.exe 101 PID 728 wrote to memory of 1696 728 cmd.exe 101 PID 728 wrote to memory of 1696 728 cmd.exe 101 PID 728 wrote to memory of 3900 728 cmd.exe 102 PID 728 wrote to memory of 3900 728 cmd.exe 102 PID 728 wrote to memory of 3900 728 cmd.exe 102 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cvtres.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cvtres.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\autoinstall dll @powergirlso2.exe"C:\Users\Admin\AppData\Local\Temp\autoinstall dll @powergirlso2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:4704 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:4680
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4800
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵
- System Location Discovery: System Language Discovery
PID:4464
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:1696
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3900
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c timeout /t 1 && DEL /f autoinstall dll @powergirlso2.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1436
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\4a1913d3634b01065ccaf1a7c75c9370\Admin@VETZEJGC_en-US\System\Process.txt
Filesize1KB
MD57609738e84bdb77a13b6615552cdcc69
SHA1a1c5ae58d65ba45db6ba4bba283f6153e7203fc2
SHA256c4b92791fa24bf931ceedbf4d78f94357b50d8d6892af7ba70539f40fa754764
SHA51285e56930eccbf0ab7d1329713d75a2583c299584d663a2717193f4d53e9c1f739ecad6df46a2c53b74be41c9fa428aa27396825968d810dd73c461297003bf95
-
C:\Users\Admin\AppData\Local\4a1913d3634b01065ccaf1a7c75c9370\Admin@VETZEJGC_en-US\System\Process.txt
Filesize2KB
MD55e6f8a6423aaf65dc30302935897caa2
SHA1530d6ad3bc6d7461f9e14487e9c99db74e7ff4ce
SHA256996e683ed8d04b1896535d330b70bbb56d462e21aa58df02af096d8d8564616b
SHA512a6620f1414a2d61728f63bd944eda6b4eb377626386fb1c636f52ceec8b4a1af918f603d3f0548c96c91a3271ae79f27622b8fbb5dcc9a690db18d1e50174092
-
C:\Users\Admin\AppData\Local\4a1913d3634b01065ccaf1a7c75c9370\Admin@VETZEJGC_en-US\System\Process.txt
Filesize2KB
MD5ae9f22f342817ab27c5dc9e23b3cccd2
SHA1c25435d4c24eca504612765d1751f49a1d96a0c9
SHA2564f189f8514985af670530b15f77d3d65fe8aefb94522331bc2bf9225f2f64d90
SHA51261aa0b536a6ea127c88d206f3cc104c2834f6162d5a8c4419d7196db1442016a47325cba848f9b0d9518f987d7e7c814d982495701404a86d6d8efe8ea55e3d7