Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    servoces64.exe

  • Size

    16.8MB

  • Sample

    240712-ty25ratcqf

  • MD5

    540c3c9ae1b97353b49de9a216532d72

  • SHA1

    bda2524601ab7cbe91287c9095f743acae55441a

  • SHA256

    0d2c84253c9a3ab2339605c4c54b1e52e8ffbb192d0b1a050b27096cdaf2f4d6

  • SHA512

    1625d62a1614d940ab44cc9c62004f32da85712d16fbeb1be015838151259f87bbfdb74387ad290db37e62d0a165e4e8c826a001b70918eb2f9111144c739d88

  • SSDEEP

    393216:OKe0h1uQjMppTvR6USajrgzKHc9bqNJy:TUQjopzR6Unjrrce

Malware Config

Targets

    • Target

      servoces64.exe

    • Size

      16.8MB

    • MD5

      540c3c9ae1b97353b49de9a216532d72

    • SHA1

      bda2524601ab7cbe91287c9095f743acae55441a

    • SHA256

      0d2c84253c9a3ab2339605c4c54b1e52e8ffbb192d0b1a050b27096cdaf2f4d6

    • SHA512

      1625d62a1614d940ab44cc9c62004f32da85712d16fbeb1be015838151259f87bbfdb74387ad290db37e62d0a165e4e8c826a001b70918eb2f9111144c739d88

    • SSDEEP

      393216:OKe0h1uQjMppTvR6USajrgzKHc9bqNJy:TUQjopzR6Unjrrce

    • Modifies security service

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks