Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    fa629b736c34390fde18d9d9b5aefe19fb848564c9823d49de691914e7401fce

  • Size

    8.8MB

  • Sample

    240815-pz2s6asanf

  • MD5

    0a52cde97d2aacd1f0ef63bc10c72b6f

  • SHA1

    dab4365a05cb401ca84f0c9b5fc3bca72fbbdfa7

  • SHA256

    fa629b736c34390fde18d9d9b5aefe19fb848564c9823d49de691914e7401fce

  • SHA512

    52755a156d3ee8caba1efe31589cd37f655225662d55e230f7491806048d69d04bae10f80f920370140db3d8c7635fc303b2222354c860c900973469b938f284

  • SSDEEP

    196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1

Malware Config

Targets

    • Target

      fa629b736c34390fde18d9d9b5aefe19fb848564c9823d49de691914e7401fce

    • Size

      8.8MB

    • MD5

      0a52cde97d2aacd1f0ef63bc10c72b6f

    • SHA1

      dab4365a05cb401ca84f0c9b5fc3bca72fbbdfa7

    • SHA256

      fa629b736c34390fde18d9d9b5aefe19fb848564c9823d49de691914e7401fce

    • SHA512

      52755a156d3ee8caba1efe31589cd37f655225662d55e230f7491806048d69d04bae10f80f920370140db3d8c7635fc303b2222354c860c900973469b938f284

    • SSDEEP

      196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1

    • Disables service(s)

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Contacts a large (16438) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • OS Credential Dumping: LSASS Memory

      Malicious access to Credentials History.

    • XMRig Miner payload

    • mimikatz is an open source tool to dump credentials on Windows

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Creates a Windows Service

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.