Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20/03/2025, 02:18
Behavioral task
behavioral1
Sample
18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992.exe
Resource
win10v2004-20250314-en
General
-
Target
18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992.exe
-
Size
7.0MB
-
MD5
556555f19852e8685dc8d465ef09b815
-
SHA1
3e1e81c632d97922df7b23ca6f4d1c2eaab303ea
-
SHA256
18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992
-
SHA512
0e8e7e3829651c49b518adb2d8e85821bc721412376988d7ec441e40711bf016077e32a31f9e5f82ae55d40a08b5a1f5429906b00c751afd8a961e9a83b702bd
-
SSDEEP
196608:bMbuV25DeTD+oqzukSIlLtIY79n8SI75bWAXAkuujCPX9YG9he5GnQCAJKNc:8A403qakSoR7tfI7ZtXADu8X9Y95GQLJ
Malware Config
Extracted
stealerium
https://api.telegram.org/bot1616004787:AAH60oNqVa82nffKp0gB2yn5A_jmiTy0_XY/sendMessage?chat_id=
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Stealerium family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3044 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 3052 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2344 18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2344 18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992.exe Token: SeDebugPrivilege 3052 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2740 2344 18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992.exe 32 PID 2344 wrote to memory of 2740 2344 18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992.exe 32 PID 2344 wrote to memory of 2740 2344 18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992.exe 32 PID 2740 wrote to memory of 2864 2740 cmd.exe 34 PID 2740 wrote to memory of 2864 2740 cmd.exe 34 PID 2740 wrote to memory of 2864 2740 cmd.exe 34 PID 2740 wrote to memory of 3052 2740 cmd.exe 35 PID 2740 wrote to memory of 3052 2740 cmd.exe 35 PID 2740 wrote to memory of 3052 2740 cmd.exe 35 PID 2740 wrote to memory of 3044 2740 cmd.exe 36 PID 2740 wrote to memory of 3044 2740 cmd.exe 36 PID 2740 wrote to memory of 3044 2740 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992.exe"C:\Users\Admin\AppData\Local\Temp\18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\11dda570-dcb0-4736-9960-488e90b86a4d.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2864
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 23443⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:3044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c10a95fcc3c2ea2c74f7751b344d3dde
SHA1a0b49c07c4ec62402f8e505c75ab2404f0829f1b
SHA2569d51488442829dc9fe3aa5a99580d1aeca6c07b938f4caf139ead44cb1784857
SHA5127b5da088dea65f0cf33e484aeb4fe32299ef18ac590b51010e504f30cf18397976d64c7e505415ceb24be0d950f959019083ea89778a37a1b970958dc089e166