Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    SwiftProcessHandlerC.exe

  • Size

    9.4MB

  • Sample

    250102-bcztdswqap

  • MD5

    1467d163d2adb262802dc7a39161d5c0

  • SHA1

    8a09eca6ac4df0a950f81c85df84bcba1999add6

  • SHA256

    29b62840d3f393f8b8c86046dd859c74ed8b262fecb27e802cbb4d716b250fea

  • SHA512

    1c75b3de6a1465f0c6f2e234eec1a3501861d37d736b683b716cc5d846a1bc323bca7a0cba6ee09b460e38f6a1251ee42b519318bb60816f71bd2aa88282d40d

  • SSDEEP

    196608:5R40bhg3xymvNm1E8giq1g98eNMHFJMIDJ+gsAGKkR6H0RWs:X40bhpm1m1Nqq4Fqy+gs1eg

Malware Config

Targets

    • Target

      SwiftProcessHandlerC.exe

    • Size

      9.4MB

    • MD5

      1467d163d2adb262802dc7a39161d5c0

    • SHA1

      8a09eca6ac4df0a950f81c85df84bcba1999add6

    • SHA256

      29b62840d3f393f8b8c86046dd859c74ed8b262fecb27e802cbb4d716b250fea

    • SHA512

      1c75b3de6a1465f0c6f2e234eec1a3501861d37d736b683b716cc5d846a1bc323bca7a0cba6ee09b460e38f6a1251ee42b519318bb60816f71bd2aa88282d40d

    • SSDEEP

      196608:5R40bhg3xymvNm1E8giq1g98eNMHFJMIDJ+gsAGKkR6H0RWs:X40bhpm1m1Nqq4Fqy+gs1eg

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      Stub.pyc

    • Size

      799KB

    • MD5

      ff699c8cc47b60391f85612e49b238de

    • SHA1

      3a26b4a56037cc7680dc418eda47d0093f5a8c96

    • SHA256

      65658c930d2163c2cbe077f291288c8f901e399a3bb90b21a0f6011145143895

    • SHA512

      43ce9fd1aa062b08ffae5c88d37c567e488a27c08ebbee33b699a3cf89ecb85b0c38cefb4dd6bd2dc1540d1280899444d69a619a4194a4e3b1afe6a949a6afda

    • SSDEEP

      12288:1jZrh0KLG3j8JjKN3itA5fcjdEkRnqtWOyrF5XQ9xhub0ztKEJoPHT84S27g+GXh:Rh/ubNhEj+xtWrFBQ/hG0xczbEVSzaH

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks