Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Seven.zip

  • Size

    1.4MB

  • Sample

    240430-b1n2ssha61

  • MD5

    f3d4e73db1f002bd9104088218321667

  • SHA1

    3e9334488fcefee12bada1587643b7f0bab90e93

  • SHA256

    5104b1b7985c530313751401ea69dbf9d8154f197d7c4af534ce8605beeb33b1

  • SHA512

    ddffbf427cbed43864e745888d6cee33a91cd6f3a64f34083cf22238683b491e7e2e8abba80ffbd11e1935591bfc55f3520cde24552e14cb9338169dd4a2d95d

  • SSDEEP

    24576:+3A6rQ6JUqjtBlw6dv2ImAoTFda/0vQyLVetvMRXG3FQksUqoKwpxteQW/enSX7b:+3AyJUqxDdvoK/0ny3ekbqorQQD4n

Malware Config

Targets

    • Target

      Seven.dll

    • Size

      1.3MB

    • MD5

      1f7090825cea66e6650e2c08df750bd4

    • SHA1

      abef7ba313d81b2ca3fa3c55621e1f5077057d19

    • SHA256

      0584db4656c638c0e515fa0793d3f174aa7f094615429f717029744e6299a10a

    • SHA512

      e186acf360fc2adc7e28fbd556f302c6273fdc3dc94516c2a1cbf1e30dd271e068892f3aa2fca03e92a48070cfa0777b70d79a59154bba843e7efa3d394a7a39

    • SSDEEP

      24576:owCzi6lcqjVdlwudf2oEwgjFNUJMvgSTVwhp6/dgbr4kU8qcUgxxFoSWv25p:ow4lcqxpdfg4JMt0b8kVqcjmSv3

    Score
    1/10
    • Target

      Seven.exe

    • Size

      139KB

    • MD5

      350273e0d2e8a9ba5e37b791016112a0

    • SHA1

      5bfb616dd46f67d1dcbbff55ca5917ffc1ec8b71

    • SHA256

      27297bf8139bea755e9297e7e1489d827d1ee09a8e1d94a3ef96a2edb2de61ba

    • SHA512

      b1e768524b4e840bd5f4163205122dd1725583245d8bfd5cbd89eb21a5fb9d33aff1b7b0ca42132b7dae469e025068ae663b3b02ad59927a558dc340141ec91b

    • SSDEEP

      3072:miS4omp03WQthI/9S3BZi08iRQ1G78IVn27bSfcJd8ltw:miS4ompB9S3BZi0a1G78IVhcTct

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables cmd.exe use via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.