Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

27/07/2024, 09:50

240727-lt1r5asbnk 10

27/07/2024, 09:38

240727-lmhb7stgpg 10

General

  • Target

    S0lardJIRE.zip

  • Size

    51.9MB

  • Sample

    240727-lt1r5asbnk

  • MD5

    578d560397dada5b6a990d2c4137334f

  • SHA1

    a42139ae316639aa25be1fae5efb8c1f4922412d

  • SHA256

    fbc77548e8938bbf771cae6cfa3eea095d35ddc2e0026dbe460488d06ec7cc43

  • SHA512

    d4c3f5af1d8f722e5f596727351e9e12abcb6a7e5b4bb131bd74dc6fbedae2ae792dc407222fded147acd7d9159d867c2a2ed8837aa0444dfc3a8ee642b1adbc

  • SSDEEP

    1572864:exBUasxBydhZz63jdbNG7VRYR8Xcjo5hgiyuPtw:exGzIh4jZNOvYR8Xot/uFw

Malware Config

Targets

    • Target

      S0laradD/S0larD.exe

    • Size

      1.0MB

    • MD5

      23070a36890ba9777456698061c77a25

    • SHA1

      de00cec9241bc8c5a26691daf0b3fa9c11198c69

    • SHA256

      35f2e98864bfdccc598cdb75e98d41b412da67d06ae8c49a8298d1cb50d49351

    • SHA512

      d4a305e0edcec0665d6c7cc2d8277e2603f48fdba50514ff193463544c990e4af969b2d6433ee8fd58ab335476efd19302fd03a114d6766bfbaf654b1187c7e2

    • SSDEEP

      24576:6hgeO08OxQO8XBQQfHuO4LW/bq8lDhdYjLr1ICqvWUPPzEWG:dLOb8R5Xljq8l9dIIffzEb

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks