Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23/02/2025, 02:56

General

  • Target

    a9c4a4b40d757cdba423f57494d97e10f9945798bd0fcd42c29e1ff5d75e2673.exe

  • Size

    2.5MB

  • MD5

    daf2f1918c4fc0bc4f62d3ef2ca5fcf5

  • SHA1

    86c58982e79bed1d54e52723ff093ee0854097de

  • SHA256

    a9c4a4b40d757cdba423f57494d97e10f9945798bd0fcd42c29e1ff5d75e2673

  • SHA512

    1671cb41575e3899512ec58541d316dad49bcdd4390a17f75bd4e463e35395d32c99d0a13243862f190eb688966fd867e0cb41c9edc0987436c166afecfb7d36

  • SSDEEP

    24576:ZRIHBzId3Kduyws2Mp74sa9mZBymHCWkxkTl9TNdsMEubODA46bnuxFJoFUBr0Kh:Zehz43hnod4V9onkyQVFOKo

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1253109934091014266/Dmdrv6qHpmv5oToIz1KdEPpQ1-xVWgQVY5fKv-5qy8MbZxkTw_uQb7UG4GOEd8HAYN7f

Signatures

  • Stealerium

    An open source info stealer written in C# first seen in May 2022.

  • Stealerium family
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9c4a4b40d757cdba423f57494d97e10f9945798bd0fcd42c29e1ff5d75e2673.exe
    "C:\Users\Admin\AppData\Local\Temp\a9c4a4b40d757cdba423f57494d97e10f9945798bd0fcd42c29e1ff5d75e2673.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 636
      2⤵
      • Program crash
      PID:2304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2104-0-0x0000000074A7E000-0x0000000074A7F000-memory.dmp

    Filesize

    4KB

  • memory/2104-1-0x0000000000CA0000-0x0000000000F2C000-memory.dmp

    Filesize

    2.5MB

  • memory/2104-2-0x000000000BEF0000-0x000000000C086000-memory.dmp

    Filesize

    1.6MB

  • memory/2104-3-0x0000000004E40000-0x0000000004FD2000-memory.dmp

    Filesize

    1.6MB