Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
19/03/2025, 02:33
Behavioral task
behavioral1
Sample
3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe
Resource
win10v2004-20250314-en
General
-
Target
3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe
-
Size
7.0MB
-
MD5
0176388641637593938f5278b326a494
-
SHA1
39d6cf486e4f292605f8cf0f6a19097e59462d6f
-
SHA256
3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158
-
SHA512
b00cd6c016b4844b8ac7b434f2bd7d621879eed815210e9a846741efd49121348755ef4d6ef9609965abbf1a154c0017c56b9fee79854bd031e3eaddfc4e4ca7
-
SSDEEP
196608:XMbuV25DeTD+oqzukSIlLtIY79n8SI75bWAXAkuujCPX9YG9he5GnQCAJKNc:AA403qakSoR7tfI7ZtXADu8X9Y95GQLJ
Malware Config
Extracted
stealerium
https://api.telegram.org/bot1616004787:AAH60oNqVa82nffKp0gB2yn5A_jmiTy0_XY/sendMessage?chat_id=
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Stealerium family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2764 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 2836 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2296 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe Token: SeDebugPrivilege 2836 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2832 2296 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 32 PID 2296 wrote to memory of 2832 2296 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 32 PID 2296 wrote to memory of 2832 2296 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 32 PID 2832 wrote to memory of 1736 2832 cmd.exe 34 PID 2832 wrote to memory of 1736 2832 cmd.exe 34 PID 2832 wrote to memory of 1736 2832 cmd.exe 34 PID 2832 wrote to memory of 2836 2832 cmd.exe 35 PID 2832 wrote to memory of 2836 2832 cmd.exe 35 PID 2832 wrote to memory of 2836 2832 cmd.exe 35 PID 2832 wrote to memory of 2764 2832 cmd.exe 36 PID 2832 wrote to memory of 2764 2832 cmd.exe 36 PID 2832 wrote to memory of 2764 2832 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe"C:\Users\Admin\AppData\Local\Temp\3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\f57eebd8-2e05-4aa2-9db1-b97e930a6f1e.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1736
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 22963⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:2764
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d01eec4ff5eb590bd890c48df3fbd82d
SHA1b63925517e71e43303d5a24f11d6a58caa92393b
SHA2566dc0f2a3ca1c43c0ef6c8e801ca88b13fd46836bf354abfd8ba49931f23a1e5b
SHA512d236f1a6750b8065be95c8d553c1c1afeb8624cc75382b74d4886140c32a73fc708bbb2dfe64e89c4f9634808a598efae1eda4d9407b62a7bd373d891eb62827