Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    comparendo24755693025simitverenlineacgbindata.exe

  • Size

    781KB

  • Sample

    240213-zadp5sha3v

  • MD5

    4848c2aa032ded794410ebc729fc18a2

  • SHA1

    ba4200a24bbd4f70594e72414493a350b4c95608

  • SHA256

    63bd1085581bf0a8f7c9b01eb5d3a2d551fcc671a3916064891ea85c00d24669

  • SHA512

    05e9bded510f16f06364ae913f1f494434b1cff4723213dbda1ebdf8da21ffa42764252e129d9e74fe501b5b273884b07213edf81efe24ec14692752f78b714b

  • SSDEEP

    12288:2rD64vvpqDUB/B1idOmEigAqiiqwTFTBK/cOV682wiVZe+0Ks:8DxvuUB7idOmEHNqsxBHOR2rVZAKs

Malware Config

Targets

    • Target

      comparendo24755693025simitverenlineacgbindata.exe

    • Size

      781KB

    • MD5

      4848c2aa032ded794410ebc729fc18a2

    • SHA1

      ba4200a24bbd4f70594e72414493a350b4c95608

    • SHA256

      63bd1085581bf0a8f7c9b01eb5d3a2d551fcc671a3916064891ea85c00d24669

    • SHA512

      05e9bded510f16f06364ae913f1f494434b1cff4723213dbda1ebdf8da21ffa42764252e129d9e74fe501b5b273884b07213edf81efe24ec14692752f78b714b

    • SSDEEP

      12288:2rD64vvpqDUB/B1idOmEigAqiiqwTFTBK/cOV682wiVZe+0Ks:8DxvuUB7idOmEHNqsxBHOR2rVZAKs

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • UAC bypass

    • Windows security bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks