Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
2ab9934c6f1943130335ca6ca749a47b06f70b1011c480e8d194f2a0f3ac850d
-
Size
660KB
-
Sample
221012-tem7gsade3
-
MD5
aa6c131a2153775c37450f522316cbef
-
SHA1
51d28f3c179ee28a555ff78b7ba265149d1d0548
-
SHA256
2ab9934c6f1943130335ca6ca749a47b06f70b1011c480e8d194f2a0f3ac850d
-
SHA512
17384b95aaa87d60eecbd1fc973dc3a7c3ce26e8a356e396da12b201e3b4a3476414b30099a116355f2222d3f4b9598d898871e4b4fd94c2afa655ed89253e62
-
SSDEEP
12288:+hM2Q557Tu3XDG26Cw6q/x0PIyGtG+x2B9DaiiVIovI0hI+Cl8x:0Q5F4G2Xw6Fe2B9eXzvx3T
Static task
static1
Behavioral task
behavioral1
Sample
2ab9934c6f1943130335ca6ca749a47b06f70b1011c480e8d194f2a0f3ac850d.exe
Resource
win7-20220901-en
Malware Config
Extracted
netwire
servr.jordangaming3.xyz:3370
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
KmDGtNEp
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
Windows Defender
-
use_mutex
true
Targets
-
-
Target
2ab9934c6f1943130335ca6ca749a47b06f70b1011c480e8d194f2a0f3ac850d
-
Size
660KB
-
MD5
aa6c131a2153775c37450f522316cbef
-
SHA1
51d28f3c179ee28a555ff78b7ba265149d1d0548
-
SHA256
2ab9934c6f1943130335ca6ca749a47b06f70b1011c480e8d194f2a0f3ac850d
-
SHA512
17384b95aaa87d60eecbd1fc973dc3a7c3ce26e8a356e396da12b201e3b4a3476414b30099a116355f2222d3f4b9598d898871e4b4fd94c2afa655ed89253e62
-
SSDEEP
12288:+hM2Q557Tu3XDG26Cw6q/x0PIyGtG+x2B9DaiiVIovI0hI+Cl8x:0Q5F4G2Xw6Fe2B9eXzvx3T
-
NetWire RAT payload
-
Looks for VirtualBox Guest Additions in registry
-
Executes dropped EXE
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-