Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975
-
Size
4.8MB
-
Sample
240610-jbwz4see87
-
MD5
cf0b2b6db9247d897dce923963cd4489
-
SHA1
69ee0a9e0d6162cf702e57f3869eb5ae3eec8661
-
SHA256
ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975
-
SHA512
2d9a61c9c38f3e71c558a2fa155a9b39ed48b4fe2dd2c045bf5c38ff7c70dfa640a7b4d85533ba74156cc4fba3dfe6f6ee28e84ea1d032ee2ae9f37cdbcc1dd9
-
SSDEEP
24576:W4L1dN9IgGFCXy3DryDNYhJkfdTazmaj9Tb9X9Pu3mmGld6oKZmMP+73lIqV:NB3pyYqhJkfdVa5TLG3mmhHmMP+bl3V
Static task
static1
Behavioral task
behavioral1
Sample
ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975
-
Size
4.8MB
-
MD5
cf0b2b6db9247d897dce923963cd4489
-
SHA1
69ee0a9e0d6162cf702e57f3869eb5ae3eec8661
-
SHA256
ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975
-
SHA512
2d9a61c9c38f3e71c558a2fa155a9b39ed48b4fe2dd2c045bf5c38ff7c70dfa640a7b4d85533ba74156cc4fba3dfe6f6ee28e84ea1d032ee2ae9f37cdbcc1dd9
-
SSDEEP
24576:W4L1dN9IgGFCXy3DryDNYhJkfdTazmaj9Tb9X9Pu3mmGld6oKZmMP+73lIqV:NB3pyYqhJkfdVa5TLG3mmhHmMP+bl3V
-
Modifies firewall policy service
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Pre-OS Boot
1Bootkit
1