Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
104s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2025, 02:18
Behavioral task
behavioral1
Sample
18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992.exe
Resource
win10v2004-20250314-en
General
-
Target
18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992.exe
-
Size
7.0MB
-
MD5
556555f19852e8685dc8d465ef09b815
-
SHA1
3e1e81c632d97922df7b23ca6f4d1c2eaab303ea
-
SHA256
18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992
-
SHA512
0e8e7e3829651c49b518adb2d8e85821bc721412376988d7ec441e40711bf016077e32a31f9e5f82ae55d40a08b5a1f5429906b00c751afd8a961e9a83b702bd
-
SSDEEP
196608:bMbuV25DeTD+oqzukSIlLtIY79n8SI75bWAXAkuujCPX9YG9he5GnQCAJKNc:8A403qakSoR7tfI7ZtXADu8X9Y95GQLJ
Malware Config
Extracted
stealerium
https://api.telegram.org/bot1616004787:AAH60oNqVa82nffKp0gB2yn5A_jmiTy0_XY/sendMessage?chat_id=
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Stealerium family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation 18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2708 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 3620 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4432 18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4432 18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992.exe Token: SeDebugPrivilege 3620 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4432 wrote to memory of 5048 4432 18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992.exe 90 PID 4432 wrote to memory of 5048 4432 18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992.exe 90 PID 5048 wrote to memory of 1596 5048 cmd.exe 92 PID 5048 wrote to memory of 1596 5048 cmd.exe 92 PID 5048 wrote to memory of 3620 5048 cmd.exe 93 PID 5048 wrote to memory of 3620 5048 cmd.exe 93 PID 5048 wrote to memory of 2708 5048 cmd.exe 94 PID 5048 wrote to memory of 2708 5048 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992.exe"C:\Users\Admin\AppData\Local\Temp\18cdbd760961bbe45ab6dac098badab8556e5c28cd24744c58f84eb3255da992.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\272f551f-b9c5-49c7-9d83-a98326ffca33.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1596
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 44323⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:2708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD569b16da13a19e1fd47d785d3e8e4f5fb
SHA1f56be91653b5cd02c66cde01f15dc988e2fe5b1c
SHA25643b7b6b0687b9564593a8b0bff127122bad8c17acd8738d3d86330eb2d3e570a
SHA5120ebbad89efaab2b902e244a088b1f891b1fc6f99c9f36c8caeea0f103fcb53157783abac66bb793a010770a9860fdd804237faae3222b4d13d14ac301ea07730