Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
7a238546ba438a42789cf5d6bd08a03f
-
Size
284KB
-
Sample
240127-nrkz1abda9
-
MD5
7a238546ba438a42789cf5d6bd08a03f
-
SHA1
1bb68ee98e317203f4df9b2195533350f58cd0be
-
SHA256
162d39f277d19f7692d6b420640502debe9327573bdc1d8402d127d94bd98e69
-
SHA512
be80c3fce348b918dfae6788725869204d4b1d4511b1dded700fa0abd09e88997daa1e968569a7edb42cb648841da6bc9149c6d6ffae9e62b0cf5f4050684977
-
SSDEEP
3072:ztM6vm1mgc3EPAJjCE/o2LA4qcw5bGIT5eNXy:5E1mgc3EPAJ2L0qZbGINely
Static task
static1
Behavioral task
behavioral1
Sample
7a238546ba438a42789cf5d6bd08a03f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7a238546ba438a42789cf5d6bd08a03f.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
7a238546ba438a42789cf5d6bd08a03f
-
Size
284KB
-
MD5
7a238546ba438a42789cf5d6bd08a03f
-
SHA1
1bb68ee98e317203f4df9b2195533350f58cd0be
-
SHA256
162d39f277d19f7692d6b420640502debe9327573bdc1d8402d127d94bd98e69
-
SHA512
be80c3fce348b918dfae6788725869204d4b1d4511b1dded700fa0abd09e88997daa1e968569a7edb42cb648841da6bc9149c6d6ffae9e62b0cf5f4050684977
-
SSDEEP
3072:ztM6vm1mgc3EPAJjCE/o2LA4qcw5bGIT5eNXy:5E1mgc3EPAJ2L0qZbGINely
-
Modifies firewall policy service
-
Modifies security service
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables taskbar notifications via registry modification
-
Drops file in Drivers directory
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2