Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
f58c41d83c0f1c1e8c1c3bd99ab6deabb14a763b54a3c5f1e821210c0536c3ff
-
Size
4.8MB
-
Sample
240410-sa76esfb3v
-
MD5
259f06fcdb971f606d239b3178110981
-
SHA1
e2180bf4b9783d42d396826fc25ff8f9394cd430
-
SHA256
f58c41d83c0f1c1e8c1c3bd99ab6deabb14a763b54a3c5f1e821210c0536c3ff
-
SHA512
1c3bdadf325a498133788afba3fe1f8c684079345753ae4c09b4562bfb445a2cfbce132e133ca04cb689fbe9a883f681c1fcf28cfed785a63e51edc3fcf327dc
-
SSDEEP
49152:HwV7e4UdEmFoxt6LT/cZv17kbW6PaxjAzW0q0Myqi5jCeazHTL/HR85zA:HwVAzcZdYbW6yxUz40My5jCe0HP
Static task
static1
Behavioral task
behavioral1
Sample
f58c41d83c0f1c1e8c1c3bd99ab6deabb14a763b54a3c5f1e821210c0536c3ff.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f58c41d83c0f1c1e8c1c3bd99ab6deabb14a763b54a3c5f1e821210c0536c3ff.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
f58c41d83c0f1c1e8c1c3bd99ab6deabb14a763b54a3c5f1e821210c0536c3ff
-
Size
4.8MB
-
MD5
259f06fcdb971f606d239b3178110981
-
SHA1
e2180bf4b9783d42d396826fc25ff8f9394cd430
-
SHA256
f58c41d83c0f1c1e8c1c3bd99ab6deabb14a763b54a3c5f1e821210c0536c3ff
-
SHA512
1c3bdadf325a498133788afba3fe1f8c684079345753ae4c09b4562bfb445a2cfbce132e133ca04cb689fbe9a883f681c1fcf28cfed785a63e51edc3fcf327dc
-
SSDEEP
49152:HwV7e4UdEmFoxt6LT/cZv17kbW6PaxjAzW0q0Myqi5jCeazHTL/HR85zA:HwVAzcZdYbW6yxUz40My5jCe0HP
-
Detect ZGRat V2
-
Modifies security service
-
SaintBot payload
-
Modifies Installed Components in the registry
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
2Windows Service
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
5