Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
test-fExjf.exe
-
Size
67.8MB
-
Sample
240819-st5jmssakh
-
MD5
d4411c96712eb6170d89a68de02ce140
-
SHA1
65151d33e8d31afc0f902e4601473ce1aadf3b0f
-
SHA256
577c2db834653d5fd393f8dfa0a80f7b580be3e6f4e88947c23b7e0b915e5082
-
SHA512
20f8fc59b4349a7e4475601c7a5dd89b7b03036bf14a14da23d51fd98839b9a3fd9367f33b9d67f441b758897bc7e9156d6815fb9eed7740b4d83bb5beae2f14
-
SSDEEP
1572864:1AOQpgcsftMl7vFQqMrlpA+Ql4JdexTivfSyWqPEb26:1AOOgBtMlJyklmexentWB26
Static task
static1
Behavioral task
behavioral1
Sample
test-fExjf.exe
Resource
win10v2004-20240802-fr
Malware Config
Targets
-
-
Target
test-fExjf.exe
-
Size
67.8MB
-
MD5
d4411c96712eb6170d89a68de02ce140
-
SHA1
65151d33e8d31afc0f902e4601473ce1aadf3b0f
-
SHA256
577c2db834653d5fd393f8dfa0a80f7b580be3e6f4e88947c23b7e0b915e5082
-
SHA512
20f8fc59b4349a7e4475601c7a5dd89b7b03036bf14a14da23d51fd98839b9a3fd9367f33b9d67f441b758897bc7e9156d6815fb9eed7740b4d83bb5beae2f14
-
SSDEEP
1572864:1AOQpgcsftMl7vFQqMrlpA+Ql4JdexTivfSyWqPEb26:1AOOgBtMlJyklmexentWB26
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3