Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
6f39bd9791dd149c4f83212e94f8a5b5879f9caad66f5af12c7d0cb0061ff9df
-
Size
7.2MB
-
Sample
240725-2lnetsself
-
MD5
5a947cdd8ca2d0506b8591a0b242e8bb
-
SHA1
64616f9d603727d28c6bffc2b88e616caff2acca
-
SHA256
6f39bd9791dd149c4f83212e94f8a5b5879f9caad66f5af12c7d0cb0061ff9df
-
SHA512
79c133cc3604c318d53e700ba4df996bbc0c64013f347a3b10cf3df01ee506829ac918f717fca553e94fbb471afe6537cae7ec1499eabe3027c5775f2d687ab4
-
SSDEEP
196608:91O2mhc5SKyAekYT/FONVsA9LV2SENcjoMIKT6/in5sUaYgW6:3O2m6SKkkYT/EAAdQSEijoMI+4i5sUJ0
Static task
static1
Behavioral task
behavioral1
Sample
6f39bd9791dd149c4f83212e94f8a5b5879f9caad66f5af12c7d0cb0061ff9df.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6f39bd9791dd149c4f83212e94f8a5b5879f9caad66f5af12c7d0cb0061ff9df.exe
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
6f39bd9791dd149c4f83212e94f8a5b5879f9caad66f5af12c7d0cb0061ff9df
-
Size
7.2MB
-
MD5
5a947cdd8ca2d0506b8591a0b242e8bb
-
SHA1
64616f9d603727d28c6bffc2b88e616caff2acca
-
SHA256
6f39bd9791dd149c4f83212e94f8a5b5879f9caad66f5af12c7d0cb0061ff9df
-
SHA512
79c133cc3604c318d53e700ba4df996bbc0c64013f347a3b10cf3df01ee506829ac918f717fca553e94fbb471afe6537cae7ec1499eabe3027c5775f2d687ab4
-
SSDEEP
196608:91O2mhc5SKyAekYT/FONVsA9LV2SENcjoMIKT6/in5sUaYgW6:3O2m6SKkkYT/EAAdQSEijoMI+4i5sUJ0
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Indirect Command Execution
Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Indirect Command Execution
1Modify Registry
2