Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/03/2025, 13:19
Behavioral task
behavioral1
Sample
Cooperbuild34.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Cooperbuild34.exe
Resource
win10v2004-20250314-en
General
-
Target
Cooperbuild34.exe
-
Size
7.0MB
-
MD5
556555f19852e8685dc8d465ef09b815
-
SHA1
3e1e81c632d97922df7b23ca6f4d1c2eaab303ea
-
SHA256
18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992
-
SHA512
0e8e7e3829651c49b518adb2d8e85821bc721412376988d7ec441e40711bf016077e32a31f9e5f82ae55d40a08b5a1f5429906b00c751afd8a961e9a83b702bd
-
SSDEEP
196608:bMbuV25DeTD+oqzukSIlLtIY79n8SI75bWAXAkuujCPX9YG9he5GnQCAJKNc:8A403qakSoR7tfI7ZtXADu8X9Y95GQLJ
Malware Config
Extracted
stealerium
https://api.telegram.org/bot1616004787:AAH60oNqVa82nffKp0gB2yn5A_jmiTy0_XY/sendMessage?chat_id=
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Stealerium family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2664 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 2572 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1668 Cooperbuild34.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1668 Cooperbuild34.exe Token: SeDebugPrivilege 2572 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2752 1668 Cooperbuild34.exe 32 PID 1668 wrote to memory of 2752 1668 Cooperbuild34.exe 32 PID 1668 wrote to memory of 2752 1668 Cooperbuild34.exe 32 PID 2752 wrote to memory of 2652 2752 cmd.exe 34 PID 2752 wrote to memory of 2652 2752 cmd.exe 34 PID 2752 wrote to memory of 2652 2752 cmd.exe 34 PID 2752 wrote to memory of 2572 2752 cmd.exe 35 PID 2752 wrote to memory of 2572 2752 cmd.exe 35 PID 2752 wrote to memory of 2572 2752 cmd.exe 35 PID 2752 wrote to memory of 2664 2752 cmd.exe 36 PID 2752 wrote to memory of 2664 2752 cmd.exe 36 PID 2752 wrote to memory of 2664 2752 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cooperbuild34.exe"C:\Users\Admin\AppData\Local\Temp\Cooperbuild34.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0942f001-868f-4bfe-8f05-93bf3587a131.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2652
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 16683⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:2664
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5195b3d5a37375fcb4d1fa0ede1030fb9
SHA1c57174332c9e5d7da456dc78eb978bfb00a6bcbb
SHA25638e1cbd9d7cc2d542fde9daf5c3b28bd3b9eb45223ac11b184a2232cfdd0476d
SHA512d185b33f65ade7f3322b6976b8f61578c142df65646357745e3cad0038b52f8006c3c596a32a4fc0948f3fd76d83b78996f85903547c6869d5b00523f5a431b9