Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3final.exe
windows7-x64
7final.exe
windows10-2004-x64
10final.exe
android-9-x86
final.exe
android-10-x64
final.exe
android-11-x64
final.exe
macos-10.15-amd64
final.exe
ubuntu-18.04-amd64
final.exe
debian-9-armhf
final.exe
debian-9-mips
final.exe
debian-9-mipsel
final.pyc
windows7-x64
final.pyc
windows10-2004-x64
final.pyc
android-9-x86
final.pyc
android-10-x64
final.pyc
android-11-x64
final.pyc
macos-10.15-amd64
final.pyc
ubuntu-18.04-amd64
final.pyc
debian-9-armhf
final.pyc
debian-9-mips
final.pyc
debian-9-mipsel
General
-
Target
final.exe
-
Size
28.5MB
-
Sample
250113-nmm9kaspgm
-
MD5
0e8ac8c96394c6a523f41e10788dd32d
-
SHA1
f5d5e6f86f5f12d25d3813406239341e19e2f4b4
-
SHA256
d765f74af0a7e3986616b3018fd6190bd389458dcd408f208cb34072ef4eef12
-
SHA512
8a7ff55f0232fe1fbd4b860f82835cf7e1b7ce9d9bc6dcaad92670e811fa599fbb29b9d902db516d9c512a283168d0f71cfe458cd707d0553748adade954c7d4
-
SSDEEP
786432:S9Yidh5ngiRW8jjYEA8h1QtIea8DZcUTJl8+Q5++PbmSkytWx04MDIy:S9J5ngwWi8sviIv61ox+Sb5k8Wx04R
Behavioral task
behavioral1
Sample
final.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
final.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
final.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
final.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
final.exe
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral6
Sample
final.exe
Resource
macos-20241101-en
Behavioral task
behavioral7
Sample
final.exe
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral8
Sample
final.exe
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral9
Sample
final.exe
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral10
Sample
final.exe
Resource
debian9-mipsel-20240729-en
Behavioral task
behavioral11
Sample
final.pyc
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
final.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
final.pyc
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral14
Sample
final.pyc
Resource
android-x64-20240910-en
Behavioral task
behavioral15
Sample
final.pyc
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral16
Sample
final.pyc
Resource
macos-20241106-en
Behavioral task
behavioral17
Sample
final.pyc
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral18
Sample
final.pyc
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral19
Sample
final.pyc
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral20
Sample
final.pyc
Resource
debian9-mipsel-20240729-en
Malware Config
Targets
-
-
Target
final.exe
-
Size
28.5MB
-
MD5
0e8ac8c96394c6a523f41e10788dd32d
-
SHA1
f5d5e6f86f5f12d25d3813406239341e19e2f4b4
-
SHA256
d765f74af0a7e3986616b3018fd6190bd389458dcd408f208cb34072ef4eef12
-
SHA512
8a7ff55f0232fe1fbd4b860f82835cf7e1b7ce9d9bc6dcaad92670e811fa599fbb29b9d902db516d9c512a283168d0f71cfe458cd707d0553748adade954c7d4
-
SSDEEP
786432:S9Yidh5ngiRW8jjYEA8h1QtIea8DZcUTJl8+Q5++PbmSkytWx04MDIy:S9J5ngwWi8sviIv61ox+Sb5k8Wx04R
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification
-
Drops file in Drivers directory
-
Possible privilege escalation attempt
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Modifies file permissions
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
final.pyc
-
Size
5.2MB
-
MD5
0d007c76a8bbe73730f6e188346447fd
-
SHA1
c343652dda63ba68865696d857a37487895a3e0b
-
SHA256
a2bd3234742f1564f1bd3ec67ff0950b572af7684aa2e8229049cf7103f77dd4
-
SHA512
a30c5954dc7a46526fe3173581986f9118ae93872b4d04d4cfc4431ccd021896183712c6eae1fdf79e06b0e2f9983d8aca3bcedb6536a469e9694cd42330a4df
-
SSDEEP
384:D/bhUjvug7MB5zpQiig/li+RvkDj1ZYIbv4cUcrvE/QwkRj6ARwGDOHd/0xF2JD5:D/P5
Score1/10 -
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify Tools
2Safe Mode Boot
1Indicator Removal
2File Deletion
2Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1