Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2025, 11:19

General

  • Target

    vHn7GXr.exe

  • Size

    1.9MB

  • MD5

    9b0037a66870424a0320cd15040b8912

  • SHA1

    c5337162912badb109c60adc4b5b62e99a0cc8cc

  • SHA256

    3034ddca83fdf82895e4f4597cec07b753de96789924d2c6105e11f702ec678b

  • SHA512

    cddaf182eeadd290e036fa38145a6e8edc888a70dd84d0806160cb033544b60b8cf36e19d743028f066407c121d4e8a6a799cc07c7e8d01fe7771c03955345e8

  • SSDEEP

    49152:H3bjXWJKgOVUvpb+OczO3ovZPIpxY5j4zrysj:rjmJKgOkpCu3coG4

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 2 IoCs
  • Stormkitty family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\vHn7GXr.exe
    "C:\Users\Admin\AppData\Local\Temp\vHn7GXr.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4820
    • C:\Users\Admin\AppData\Local\Temp\input.exe
      "C:\Users\Admin\AppData\Local\Temp\input.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4812
    • C:\Users\Admin\AppData\Local\Temp\telegram.exe
      "C:\Users\Admin\AppData\Local\Temp\telegram.exe"
      2⤵
      • Executes dropped EXE
      • Accesses Microsoft Outlook profiles
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:1036
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Wi-Fi Discovery
        • Suspicious use of WriteProcessMemory
        PID:4792
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1252
        • C:\Windows\SysWOW64\netsh.exe
          netsh wlan show profile
          4⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Wi-Fi Discovery
          PID:3664
        • C:\Windows\SysWOW64\findstr.exe
          findstr All
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3248
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1036 -s 2524
        3⤵
        • Program crash
        PID:4872
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3552
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1136
        • C:\Windows\SysWOW64\netsh.exe
          netsh wlan show networks mode=bssid
          4⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:2252
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1036 -ip 1036
    1⤵
      PID:3728

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\212.102.63.147\Browsers\Firefox\FirefoxBookmarks.txt

      Filesize

      105B

      MD5

      2e9d094dda5cdc3ce6519f75943a4ff4

      SHA1

      5d989b4ac8b699781681fe75ed9ef98191a5096c

      SHA256

      c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

      SHA512

      d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

    • C:\Users\Admin\AppData\Local\Temp\input.exe

      Filesize

      215KB

      MD5

      be022d67d38839ef6b9e62334743c169

      SHA1

      4ee1dd0c615473b50fa374b221c03af6f8636ad0

      SHA256

      df4df73ce1ad7286a7fc7335e9fdae79cc7eaebf841f54897da0d56f7b628569

      SHA512

      fd2a5b845cda771d7fcfba223cc9c5026a87cc62370c8bf72f50755da888d83a6da051de13958f9f5824083390551796ce070a1a7a5a2baa6e16261e952e5e9d

    • C:\Users\Admin\AppData\Local\Temp\telegram.exe

      Filesize

      213KB

      MD5

      0684b702191e6427ad069f0b2eea4cc8

      SHA1

      80f16aedde1eb72d2a839f7f1ab6d8b5c9ffe0f3

      SHA256

      be6660f0cb82b31a71ed8e383244e85ff881749b97ebad0806017351d8229daf

      SHA512

      b4726cfa9c0209ccc6bb4a6b8c5092be1691957290db808581b514e20b07c14fcddf9f14ca75f25f57014a6b28334dacb727527d1edb790f167cd35d4e661fbb

    • memory/1036-31-0x0000000005CA0000-0x00000000061CC000-memory.dmp

      Filesize

      5.2MB

    • memory/1036-26-0x00000000001E0000-0x000000000021C000-memory.dmp

      Filesize

      240KB

    • memory/1036-28-0x00000000026E0000-0x00000000026F2000-memory.dmp

      Filesize

      72KB

    • memory/1036-30-0x0000000004D60000-0x0000000004F22000-memory.dmp

      Filesize

      1.8MB

    • memory/1036-32-0x0000000006640000-0x00000000066A6000-memory.dmp

      Filesize

      408KB

    • memory/1036-41-0x00000000069B0000-0x0000000006A42000-memory.dmp

      Filesize

      584KB

    • memory/4812-21-0x0000000001290000-0x00000000012C0000-memory.dmp

      Filesize

      192KB

    • memory/4812-20-0x00000000004C0000-0x00000000004FA000-memory.dmp

      Filesize

      232KB

    • memory/4820-29-0x00000000008B0000-0x0000000000D88000-memory.dmp

      Filesize

      4.8MB

    • memory/4820-0-0x00000000008B0000-0x0000000000D88000-memory.dmp

      Filesize

      4.8MB