Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
file.vbs
-
Size
368B
-
Sample
240630-p91c3syapc
-
MD5
8a7f6196a785962acf3102ed2bacd9ff
-
SHA1
521aee12da238561abceeb69c7f44e78f6701bc5
-
SHA256
cadad69c5be75a30bc8b45682f0ee21e406afbc023e2a016c0de32f3f8e46352
-
SHA512
7ba51f54dcfed88a8d9dfb0e37e15b3272141d072fa690c9c8bcd9d3259e3b998ff2d2aaf894de556cba755dca0f2d0f4d9372ecbf58fa41996e13a0615296a9
Static task
static1
Behavioral task
behavioral1
Sample
file.vbs
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
file.vbs
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
file.vbs
-
Size
368B
-
MD5
8a7f6196a785962acf3102ed2bacd9ff
-
SHA1
521aee12da238561abceeb69c7f44e78f6701bc5
-
SHA256
cadad69c5be75a30bc8b45682f0ee21e406afbc023e2a016c0de32f3f8e46352
-
SHA512
7ba51f54dcfed88a8d9dfb0e37e15b3272141d072fa690c9c8bcd9d3259e3b998ff2d2aaf894de556cba755dca0f2d0f4d9372ecbf58fa41996e13a0615296a9
Score8/10-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Manipulates Digital Signatures
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
-
Boot or Logon Autostart Execution: Print Processors
Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Modifies termsrv.dll
Commonly used to allow simultaneous RDP sessions.
-