Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

28/06/2024, 02:19

240628-cr3n9swcqg 8

21/06/2024, 17:11

240621-vqpecsscqk 8

20/06/2024, 14:32

240620-rwkftasdmc 8

13/06/2024, 21:29

240613-1cbh8svbkm 8

13/06/2024, 21:24

240613-z9bptszhke 8

13/06/2024, 21:01

240613-ztvsrszdre 8

General

  • Target

    VineMEMZ-Original.exe

  • Size

    39.6MB

  • Sample

    240620-rwkftasdmc

  • MD5

    b949ba30eb82cc79eeb7c2d64f483bcb

  • SHA1

    8361089264726bb6cff752b3c137fde6d01f4d80

  • SHA256

    5f6a8f0e85704eb30340a872eec136623e57ab014b4dd165c68dd8cd76143923

  • SHA512

    e2acd4fe7627e55be3e019540269033f65d4954831a732d7a4bd50607260cd2a238832f604fa344f04be9f70e8757a9f2d797de37b440159a16bf3a6359a759b

  • SSDEEP

    786432:1fhwEXgLYTou24XbHzjkgV5bQAH/AbkP1hn0qPQPrhBPC7wYqljbdPIa:dqgb84DPn5vhbIPdZaWljbdPIa

Malware Config

Targets

    • Target

      VineMEMZ-Original.exe

    • Size

      39.6MB

    • MD5

      b949ba30eb82cc79eeb7c2d64f483bcb

    • SHA1

      8361089264726bb6cff752b3c137fde6d01f4d80

    • SHA256

      5f6a8f0e85704eb30340a872eec136623e57ab014b4dd165c68dd8cd76143923

    • SHA512

      e2acd4fe7627e55be3e019540269033f65d4954831a732d7a4bd50607260cd2a238832f604fa344f04be9f70e8757a9f2d797de37b440159a16bf3a6359a759b

    • SSDEEP

      786432:1fhwEXgLYTou24XbHzjkgV5bQAH/AbkP1hn0qPQPrhBPC7wYqljbdPIa:dqgb84DPn5vhbIPdZaWljbdPIa

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Event Triggered Execution: Image File Execution Options Injection

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks