Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    a549c31c9f8dd7d11dfa3b9b3ff12c293ed6a5f3e735d9c6578f07f9153b0fc3

  • Size

    556KB

  • Sample

    221206-rt7tbsfc33

  • MD5

    032b91072be80281729f7c1f885eea80

  • SHA1

    d34598ac37a8ac46d8472e2868bb59fd5b9111ce

  • SHA256

    a549c31c9f8dd7d11dfa3b9b3ff12c293ed6a5f3e735d9c6578f07f9153b0fc3

  • SHA512

    0aca360435a62b9e13fe0c94ba1b77b9a500091528a54aff5415da8c1853f785d3d6c01c2bddbb66dfd39cead52720d9fa81b0a387c0124d2487da10b4f1dfd2

  • SSDEEP

    12288:u7Lo8Rs90X41cnOOWB2KpyYK4BVqZDx2mpmHPW9GROsI8w:u7L1yMgcnOds44Fp2PWUDI8

Malware Config

Targets

    • Target

      a549c31c9f8dd7d11dfa3b9b3ff12c293ed6a5f3e735d9c6578f07f9153b0fc3

    • Size

      556KB

    • MD5

      032b91072be80281729f7c1f885eea80

    • SHA1

      d34598ac37a8ac46d8472e2868bb59fd5b9111ce

    • SHA256

      a549c31c9f8dd7d11dfa3b9b3ff12c293ed6a5f3e735d9c6578f07f9153b0fc3

    • SHA512

      0aca360435a62b9e13fe0c94ba1b77b9a500091528a54aff5415da8c1853f785d3d6c01c2bddbb66dfd39cead52720d9fa81b0a387c0124d2487da10b4f1dfd2

    • SSDEEP

      12288:u7Lo8Rs90X41cnOOWB2KpyYK4BVqZDx2mpmHPW9GROsI8w:u7L1yMgcnOds44Fp2PWUDI8

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks