Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    ROBLOX.exe

  • Size

    924KB

  • Sample

    240706-m37sgaxbjn

  • MD5

    50b38b34a3b4a1b8e578177e2e89db23

  • SHA1

    ac8c4e1f330403fd6049fe83380712487aa68056

  • SHA256

    97f3a2e10a7d615d014096cc62bea5dc588e5b54cca7c6c3a39468067bf355e0

  • SHA512

    9943923290501099546ae22eccea09c3516d4d029fb958885095674232f052dcf203c3c3bbc92666046cfd50fc87fa1d990d7a63badbfb237158fdb3d8b880a1

  • SSDEEP

    24576:82Nbb3UiQjja+lrJrwCPsE+q5CL8EsDV+xX1JuxZV:82N3OjJFP/+VPxl4xZ

Malware Config

Targets

    • Target

      ROBLOX.exe

    • Size

      924KB

    • MD5

      50b38b34a3b4a1b8e578177e2e89db23

    • SHA1

      ac8c4e1f330403fd6049fe83380712487aa68056

    • SHA256

      97f3a2e10a7d615d014096cc62bea5dc588e5b54cca7c6c3a39468067bf355e0

    • SHA512

      9943923290501099546ae22eccea09c3516d4d029fb958885095674232f052dcf203c3c3bbc92666046cfd50fc87fa1d990d7a63badbfb237158fdb3d8b880a1

    • SSDEEP

      24576:82Nbb3UiQjja+lrJrwCPsE+q5CL8EsDV+xX1JuxZV:82N3OjJFP/+VPxl4xZ

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Stops running service(s)

    • Executes dropped EXE

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks