Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
105s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2025, 13:09
Behavioral task
behavioral1
Sample
Cooperbuild34.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
Cooperbuild34.exe
Resource
win10v2004-20250314-en
General
-
Target
Cooperbuild34.exe
-
Size
7.0MB
-
MD5
556555f19852e8685dc8d465ef09b815
-
SHA1
3e1e81c632d97922df7b23ca6f4d1c2eaab303ea
-
SHA256
18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992
-
SHA512
0e8e7e3829651c49b518adb2d8e85821bc721412376988d7ec441e40711bf016077e32a31f9e5f82ae55d40a08b5a1f5429906b00c751afd8a961e9a83b702bd
-
SSDEEP
196608:bMbuV25DeTD+oqzukSIlLtIY79n8SI75bWAXAkuujCPX9YG9he5GnQCAJKNc:8A403qakSoR7tfI7ZtXADu8X9Y95GQLJ
Malware Config
Extracted
stealerium
https://api.telegram.org/bot1616004787:AAH60oNqVa82nffKp0gB2yn5A_jmiTy0_XY/sendMessage?chat_id=
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Stealerium family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation Cooperbuild34.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3912 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 2804 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4828 Cooperbuild34.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4828 Cooperbuild34.exe Token: SeDebugPrivilege 2804 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4828 wrote to memory of 5820 4828 Cooperbuild34.exe 89 PID 4828 wrote to memory of 5820 4828 Cooperbuild34.exe 89 PID 5820 wrote to memory of 1328 5820 cmd.exe 91 PID 5820 wrote to memory of 1328 5820 cmd.exe 91 PID 5820 wrote to memory of 2804 5820 cmd.exe 92 PID 5820 wrote to memory of 2804 5820 cmd.exe 92 PID 5820 wrote to memory of 3912 5820 cmd.exe 93 PID 5820 wrote to memory of 3912 5820 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cooperbuild34.exe"C:\Users\Admin\AppData\Local\Temp\Cooperbuild34.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9c86b95a-a76d-4dd6-8a4b-63d2106be58f.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:5820 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1328
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 48283⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:3912
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55177fd1761d42d1aad35da64c355db37
SHA1b48c8785f43f65425d2d0d1b825ad497c1bb0703
SHA256b5137698e167e822092c3929918964f72a79f8ef5fc2e65afa3341df1a8f33d7
SHA51231e83191f4334b97ba468b6e6785c28994cd3b51d504ed1d122cd691c5a07b4d10e3fd9ddcef95d54237d11ad93fbc2dcb932365b20e1e2161d8f3ce04a170f1