Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    01799099.exe.vbs

  • Size

    1.1MB

  • Sample

    230609-j4earscc81

  • MD5

    584f03161a17b36b2f5163dd85bc0b77

  • SHA1

    04dad07d0146ff09c0dacc3f248dbda16055a609

  • SHA256

    ee2a2b418e82683de196beb5d4f6cb213e7579d783b06b9949f4a988f515b324

  • SHA512

    530ef231a0fea29700d8bbffa5ed40b4cc05b96323fcbd853e86f050362d84f8a5250387f86a47ec0f103a76b00bada9c352a3c6c76736740984732c184003ff

  • SSDEEP

    24576:gjSdueeKiZeXA940z802o5mNBriKgcdgUixQsUgk:gjSduKCeA2oqdJqfk

Malware Config

Targets

    • Target

      01799099.exe.vbs

    • Size

      1.1MB

    • MD5

      584f03161a17b36b2f5163dd85bc0b77

    • SHA1

      04dad07d0146ff09c0dacc3f248dbda16055a609

    • SHA256

      ee2a2b418e82683de196beb5d4f6cb213e7579d783b06b9949f4a988f515b324

    • SHA512

      530ef231a0fea29700d8bbffa5ed40b4cc05b96323fcbd853e86f050362d84f8a5250387f86a47ec0f103a76b00bada9c352a3c6c76736740984732c184003ff

    • SSDEEP

      24576:gjSdueeKiZeXA940z802o5mNBriKgcdgUixQsUgk:gjSduKCeA2oqdJqfk

    • UAC bypass

    • Disables RegEdit via registry modification

    • Disables cmd.exe use via registry modification

    • Modifies Installed Components in the registry

    • Possible privilege escalation attempt

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Modifies file permissions

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Modifies termsrv.dll

      Commonly used to allow simultaneous RDP sessions.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks