Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
Chorme_installer_v56.58.03.msi.v
-
Size
37.2MB
-
Sample
241003-gl7s9axgqj
-
MD5
2e859514e7c8e73b276d5f0cbe5a7cca
-
SHA1
2d46ba837702a6f11bed1a6298b7fd443feb8c63
-
SHA256
9c9aca6b60e90876f4c2727ecfb5ec5021586f830dee3da064f9d99605410d15
-
SHA512
5a00b43861009cf82708167b263965cad7a327bbcb2bd01c3c1bcc1e6793ef75aa5fe8035a54e9f502cac5b7aa3a92b251d53481eff15b04870a3d07aa27d257
-
SSDEEP
786432:Pib1xBH1OwK5d+coZlrR0GiuskPuJJNJUON8y+cv+1dnnZZ8bbiqbBP0:Kb1X1O/d+co3ODJNJV8fcva9nZZmi6
Static task
static1
Behavioral task
behavioral1
Sample
Chorme_installer_v56.58.03.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Chorme_installer_v56.58.03.msi
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Chorme_installer_v56.58.03.msi.v
-
Size
37.2MB
-
MD5
2e859514e7c8e73b276d5f0cbe5a7cca
-
SHA1
2d46ba837702a6f11bed1a6298b7fd443feb8c63
-
SHA256
9c9aca6b60e90876f4c2727ecfb5ec5021586f830dee3da064f9d99605410d15
-
SHA512
5a00b43861009cf82708167b263965cad7a327bbcb2bd01c3c1bcc1e6793ef75aa5fe8035a54e9f502cac5b7aa3a92b251d53481eff15b04870a3d07aa27d257
-
SSDEEP
786432:Pib1xBH1OwK5d+coZlrR0GiuskPuJJNJUON8y+cv+1dnnZZ8bbiqbBP0:Kb1X1O/d+co3ODJNJV8fcva9nZZmi6
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
2Component Object Model Hijacking
1Installer Packages
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
2Component Object Model Hijacking
1Installer Packages
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1