Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
10c8eefdb8344886070087f4522f92d33ee5cea76f0261fac60a5cb66354e689
-
Size
2.0MB
-
Sample
231114-xnbrladh26
-
MD5
8e65ea65872f75ccfd39c9b3a976a4ea
-
SHA1
da6db35943ca0c75cd7031495c40204fe3875ef9
-
SHA256
10c8eefdb8344886070087f4522f92d33ee5cea76f0261fac60a5cb66354e689
-
SHA512
b1c2e09595dbf8453310b5a547235965b86b2252db02ce1c6e0abe9017e844174c4596855ee3a414e9e49258651139624bb2e2900a92c3e839289b7580bc874b
-
SSDEEP
6144:P3ve8ySm8hQAAIfFrRXuEE+0l97mKwKR6HVGI86JQPDHDdx/Qtqa:u/zkFF+EExZmKbReVzPJQPDHvd
Static task
static1
Behavioral task
behavioral1
Sample
10c8eefdb8344886070087f4522f92d33ee5cea76f0261fac60a5cb66354e689.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
10c8eefdb8344886070087f4522f92d33ee5cea76f0261fac60a5cb66354e689.exe
Resource
win10v2004-20231020-en
Malware Config
Targets
-
-
Target
10c8eefdb8344886070087f4522f92d33ee5cea76f0261fac60a5cb66354e689
-
Size
2.0MB
-
MD5
8e65ea65872f75ccfd39c9b3a976a4ea
-
SHA1
da6db35943ca0c75cd7031495c40204fe3875ef9
-
SHA256
10c8eefdb8344886070087f4522f92d33ee5cea76f0261fac60a5cb66354e689
-
SHA512
b1c2e09595dbf8453310b5a547235965b86b2252db02ce1c6e0abe9017e844174c4596855ee3a414e9e49258651139624bb2e2900a92c3e839289b7580bc874b
-
SSDEEP
6144:P3ve8ySm8hQAAIfFrRXuEE+0l97mKwKR6HVGI86JQPDHDdx/Qtqa:u/zkFF+EExZmKbReVzPJQPDHvd
Score10/10-
Modifies WinLogon for persistence
-
Adds policy Run key to start application
-
Disables RegEdit via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1