Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
19/03/2025, 13:09
Behavioral task
behavioral1
Sample
Cooperbuild34.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
Cooperbuild34.exe
Resource
win10v2004-20250314-en
General
-
Target
Cooperbuild34.exe
-
Size
7.0MB
-
MD5
556555f19852e8685dc8d465ef09b815
-
SHA1
3e1e81c632d97922df7b23ca6f4d1c2eaab303ea
-
SHA256
18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992
-
SHA512
0e8e7e3829651c49b518adb2d8e85821bc721412376988d7ec441e40711bf016077e32a31f9e5f82ae55d40a08b5a1f5429906b00c751afd8a961e9a83b702bd
-
SSDEEP
196608:bMbuV25DeTD+oqzukSIlLtIY79n8SI75bWAXAkuujCPX9YG9he5GnQCAJKNc:8A403qakSoR7tfI7ZtXADu8X9Y95GQLJ
Malware Config
Extracted
stealerium
https://api.telegram.org/bot1616004787:AAH60oNqVa82nffKp0gB2yn5A_jmiTy0_XY/sendMessage?chat_id=
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Stealerium family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2980 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 2268 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2072 Cooperbuild34.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2072 Cooperbuild34.exe Token: SeDebugPrivilege 2268 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2072 wrote to memory of 264 2072 Cooperbuild34.exe 32 PID 2072 wrote to memory of 264 2072 Cooperbuild34.exe 32 PID 2072 wrote to memory of 264 2072 Cooperbuild34.exe 32 PID 264 wrote to memory of 2452 264 cmd.exe 34 PID 264 wrote to memory of 2452 264 cmd.exe 34 PID 264 wrote to memory of 2452 264 cmd.exe 34 PID 264 wrote to memory of 2268 264 cmd.exe 35 PID 264 wrote to memory of 2268 264 cmd.exe 35 PID 264 wrote to memory of 2268 264 cmd.exe 35 PID 264 wrote to memory of 2980 264 cmd.exe 36 PID 264 wrote to memory of 2980 264 cmd.exe 36 PID 264 wrote to memory of 2980 264 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cooperbuild34.exe"C:\Users\Admin\AppData\Local\Temp\Cooperbuild34.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\229d6ac9-ce43-4138-8f89-68806683e59f.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2452
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 20723⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:2980
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53645127da67c01781fc6724df29c23d2
SHA1d7e2c1a31afd216dbe6657fec7087424b313e809
SHA25687521f0dd17aca0d4c66aba55f5cdd866e022b1efbed558096328edda7c402e3
SHA5123c0237135f8de05fa7e9e397fd6bc025a11e5eefcec52bdccadee1c129beb23ba091ca5cacfcf12a0cf9a7ee7b3ce38405b86a9f4adc4ad899556689d0326522