Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
115s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2025, 10:54
Static task
static1
Behavioral task
behavioral1
Sample
Listado Facturas.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Listado Facturas.exe
Resource
win10v2004-20250314-en
General
-
Target
Listado Facturas.exe
-
Size
7.9MB
-
MD5
e44441da8f8b45b56e6b46ab5ddf4736
-
SHA1
d8b09914d7e463e72ddc13206b86c3d90aa993c2
-
SHA256
10fb218b942d8e1e9e070b82f01ce72128a19e97158003b53686b4d7a03a8aa8
-
SHA512
84f5c7299e954d773ac2c65c3849dbf2bb4a4fefc395a8afc6cb30ee236d9d37d5cfb5caefdb7a906ea5a8a11884fb0c64483f2c454ac00232d79701676cfa20
-
SSDEEP
196608:8R1r9MalxTjLcUeLs8fk4kgQeo49tAQxVEkWxATVmVg5NsED5lO4:sria3TjYs8M4kPeo4fAHxsVSgw85
Malware Config
Extracted
stealerium
https://api.telegram.org/bot7756107542:AAEhuCgRX-ckFVwps3xqgrtyb3JVRKo9Tog/sendMessage?chat_id=
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Stealerium family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1464 created 3428 1464 Listado Facturas.exe 56 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation Listado Facturas.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1464 set thread context of 5100 1464 Listado Facturas.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3084 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 5316 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1464 Listado Facturas.exe 5100 Listado Facturas.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1464 Listado Facturas.exe Token: SeDebugPrivilege 1464 Listado Facturas.exe Token: SeDebugPrivilege 5100 Listado Facturas.exe Token: SeDebugPrivilege 5316 taskkill.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1464 wrote to memory of 5100 1464 Listado Facturas.exe 97 PID 1464 wrote to memory of 5100 1464 Listado Facturas.exe 97 PID 1464 wrote to memory of 5100 1464 Listado Facturas.exe 97 PID 1464 wrote to memory of 5100 1464 Listado Facturas.exe 97 PID 1464 wrote to memory of 5100 1464 Listado Facturas.exe 97 PID 1464 wrote to memory of 5100 1464 Listado Facturas.exe 97 PID 5100 wrote to memory of 6128 5100 Listado Facturas.exe 98 PID 5100 wrote to memory of 6128 5100 Listado Facturas.exe 98 PID 6128 wrote to memory of 4976 6128 cmd.exe 100 PID 6128 wrote to memory of 4976 6128 cmd.exe 100 PID 6128 wrote to memory of 5316 6128 cmd.exe 101 PID 6128 wrote to memory of 5316 6128 cmd.exe 101 PID 6128 wrote to memory of 3084 6128 cmd.exe 102 PID 6128 wrote to memory of 3084 6128 cmd.exe 102
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\Listado Facturas.exe"C:\Users\Admin\AppData\Local\Temp\Listado Facturas.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\Listado Facturas.exe"C:\Users\Admin\AppData\Local\Temp\Listado Facturas.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\e69929f7-13ce-4e62-8ad0-831b468ace24.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:6128 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:4976
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 51004⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5316
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:3084
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD528e669b5b9a864bc2040223e9dccb74b
SHA1546b5939be3e06edb023cb384ea96e7bcafbe90c
SHA25675b3224955d8eef1fb1c1b6fbfd7f3b8345933e92a10444614d0953dfdd5b330
SHA512a2360dd4c459a73900987f5f37c72203ff651a10307bdaff5bf652cc8718b450a46ee4b2e135135b525683aae28e20ed3650681bdcf7868bdd9c504d85239653