Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    c9f78152e95b3ed08dca5b11433d527fb82159a928fac5562b64b95c8fad97fb

  • Size

    255KB

  • Sample

    221127-xsd3hsbf43

  • MD5

    bbbb3a7f37cfdf3af1a185a9cff0c9e9

  • SHA1

    24ecfeff06eb06fe4532a1239e3410b55ad09c1d

  • SHA256

    c9f78152e95b3ed08dca5b11433d527fb82159a928fac5562b64b95c8fad97fb

  • SHA512

    18b24947405bb57c103d1c4aaf2ce89f7f45f4ff1317b989437956dd419cdad9f7a7a080130d1bd324856765834f8ffa3e4421b8ddabf2de601693ecbf3ae46b

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJx:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIC

Malware Config

Targets

    • Target

      c9f78152e95b3ed08dca5b11433d527fb82159a928fac5562b64b95c8fad97fb

    • Size

      255KB

    • MD5

      bbbb3a7f37cfdf3af1a185a9cff0c9e9

    • SHA1

      24ecfeff06eb06fe4532a1239e3410b55ad09c1d

    • SHA256

      c9f78152e95b3ed08dca5b11433d527fb82159a928fac5562b64b95c8fad97fb

    • SHA512

      18b24947405bb57c103d1c4aaf2ce89f7f45f4ff1317b989437956dd419cdad9f7a7a080130d1bd324856765834f8ffa3e4421b8ddabf2de601693ecbf3ae46b

    • SSDEEP

      3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJx:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIC

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks