Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

24/08/2024, 21:19

240824-z6pghszfmb 8

24/08/2024, 21:09

240824-zztsnazcjg 10

General

  • Target

    setup.exe

  • Size

    5.1MB

  • Sample

    240824-z6pghszfmb

  • MD5

    c27394235f7d193be77b7145615719c0

  • SHA1

    962d82f167c1a5500d2e8016cdef68f43a6fe7f5

  • SHA256

    e23b5f906dbc62965d4e8bdba540f2b5e9b9350c9da6dea3822df5f259323652

  • SHA512

    f40951cd9eecc7a10c445f05d742728acfaae323f93c4d5aef6e5619c1aa1127452a4007bac8647cf61887587f881c385faa337915f41cd12888050785ec5be3

  • SSDEEP

    98304:3f7wCQInrje/CAVMJy1W9kWR+66KqHGXMDWc4LfvSSZEY76JHlXmHN:3fn6/VSlyr66EML4Lfaod7ipw

Malware Config

Targets

    • Target

      setup.exe

    • Size

      5.1MB

    • MD5

      c27394235f7d193be77b7145615719c0

    • SHA1

      962d82f167c1a5500d2e8016cdef68f43a6fe7f5

    • SHA256

      e23b5f906dbc62965d4e8bdba540f2b5e9b9350c9da6dea3822df5f259323652

    • SHA512

      f40951cd9eecc7a10c445f05d742728acfaae323f93c4d5aef6e5619c1aa1127452a4007bac8647cf61887587f881c385faa337915f41cd12888050785ec5be3

    • SSDEEP

      98304:3f7wCQInrje/CAVMJy1W9kWR+66KqHGXMDWc4LfvSSZEY76JHlXmHN:3fn6/VSlyr66EML4Lfaod7ipw

    • Contacts a large (1248) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Downloads MZ/PE file

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks