Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
comparendo24755693025simitverenlineacgbindata.exe
-
Size
781KB
-
Sample
240213-zadp5sha3v
-
MD5
4848c2aa032ded794410ebc729fc18a2
-
SHA1
ba4200a24bbd4f70594e72414493a350b4c95608
-
SHA256
63bd1085581bf0a8f7c9b01eb5d3a2d551fcc671a3916064891ea85c00d24669
-
SHA512
05e9bded510f16f06364ae913f1f494434b1cff4723213dbda1ebdf8da21ffa42764252e129d9e74fe501b5b273884b07213edf81efe24ec14692752f78b714b
-
SSDEEP
12288:2rD64vvpqDUB/B1idOmEigAqiiqwTFTBK/cOV682wiVZe+0Ks:8DxvuUB7idOmEHNqsxBHOR2rVZAKs
Static task
static1
Behavioral task
behavioral1
Sample
comparendo24755693025simitverenlineacgbindata.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
comparendo24755693025simitverenlineacgbindata.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
comparendo24755693025simitverenlineacgbindata.exe
-
Size
781KB
-
MD5
4848c2aa032ded794410ebc729fc18a2
-
SHA1
ba4200a24bbd4f70594e72414493a350b4c95608
-
SHA256
63bd1085581bf0a8f7c9b01eb5d3a2d551fcc671a3916064891ea85c00d24669
-
SHA512
05e9bded510f16f06364ae913f1f494434b1cff4723213dbda1ebdf8da21ffa42764252e129d9e74fe501b5b273884b07213edf81efe24ec14692752f78b714b
-
SSDEEP
12288:2rD64vvpqDUB/B1idOmEigAqiiqwTFTBK/cOV682wiVZe+0Ks:8DxvuUB7idOmEHNqsxBHOR2rVZAKs
Score10/10-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Modifies security service
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1