Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
93ADC545175ABEC10A0925CCE209DB34.exe
-
Size
2.6MB
-
Sample
241027-2t8ezaskaw
-
MD5
93adc545175abec10a0925cce209db34
-
SHA1
dbbca20193db5576e2327fe306f37b154c443e74
-
SHA256
12137b32413d31781f51a13c09bd541efe0f27f270108d247099434df1d3b37f
-
SHA512
84e0c90d2f5c7477f0932047b3757108a4b1beabc67391878ea73f401fdb3d25cb8a64a00640773567dfcdbb7cee08c07c57afb36b210e4e58bbf1c2d5b0a483
-
SSDEEP
49152:IBJ8Nvfm1AbdP+p7/wF9ZetfXO51x3XFE9GXUY5n5nHd8b2HUhR:yKndm2fZWGLxnFr5HS9f
Static task
static1
Behavioral task
behavioral1
Sample
93ADC545175ABEC10A0925CCE209DB34.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
93ADC545175ABEC10A0925CCE209DB34.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
93ADC545175ABEC10A0925CCE209DB34.exe
-
Size
2.6MB
-
MD5
93adc545175abec10a0925cce209db34
-
SHA1
dbbca20193db5576e2327fe306f37b154c443e74
-
SHA256
12137b32413d31781f51a13c09bd541efe0f27f270108d247099434df1d3b37f
-
SHA512
84e0c90d2f5c7477f0932047b3757108a4b1beabc67391878ea73f401fdb3d25cb8a64a00640773567dfcdbb7cee08c07c57afb36b210e4e58bbf1c2d5b0a483
-
SSDEEP
49152:IBJ8Nvfm1AbdP+p7/wF9ZetfXO51x3XFE9GXUY5n5nHd8b2HUhR:yKndm2fZWGLxnFr5HS9f
Score10/10-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1