Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    SecuriteInfo.com.Win32.Heri.26498.16176

  • Size

    4.8MB

  • Sample

    200707-gwg4hp5qs2

  • MD5

    98208f7fc593255491f1824c24315934

  • SHA1

    5151cf986819bf0546630ee84447b430c6b4c587

  • SHA256

    6ad2831339a2a6fc8d140c8718cf38fabef9915409bd32cd86221b515b4be629

  • SHA512

    6709fa75b845249683c07738c9eabd0df08b872bd406da3be33feab4b4f5139c42f400b0f326c98522c9dee9b991aab0fc21f9f5ca4215436232b79a18248639

Malware Config

Targets

    • Target

      SecuriteInfo.com.Win32.Heri.26498.16176

    • Size

      4.8MB

    • MD5

      98208f7fc593255491f1824c24315934

    • SHA1

      5151cf986819bf0546630ee84447b430c6b4c587

    • SHA256

      6ad2831339a2a6fc8d140c8718cf38fabef9915409bd32cd86221b515b4be629

    • SHA512

      6709fa75b845249683c07738c9eabd0df08b872bd406da3be33feab4b4f5139c42f400b0f326c98522c9dee9b991aab0fc21f9f5ca4215436232b79a18248639

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies service

MITRE ATT&CK Enterprise v6

Tasks