Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    chrome-net-export-log.json

  • Size

    4.4MB

  • Sample

    250131-dr7tnaxng1

  • MD5

    c818d17aa9d07cd0b72e9b23f8ea2821

  • SHA1

    e97d0746a2bf2acd0f77afcec32e77846e61c791

  • SHA256

    09919ecda8ce853fc3922a37ca776d8eec278da1e62c10a76d545b28c2a4bd64

  • SHA512

    e9f3f97c85838748b1058e0d521c15f6fcf60ff1b62a6ba59f6b0f13fd05ce5a04f3f1ca0e453034db6bb5e23c05ccae27934134cab432407791f78aa39608a1

  • SSDEEP

    49152:GO2OKOHOQO8OBOQOwOGOVOXOMO7OVOSOiOBOWOsO0OCOLOLOAOqOhOHOYO0O/WrX:/

Malware Config

Extracted

Family

azorult

C2

http://boglogov.site/index.php

Targets

    • Target

      chrome-net-export-log.json

    • Size

      4.4MB

    • MD5

      c818d17aa9d07cd0b72e9b23f8ea2821

    • SHA1

      e97d0746a2bf2acd0f77afcec32e77846e61c791

    • SHA256

      09919ecda8ce853fc3922a37ca776d8eec278da1e62c10a76d545b28c2a4bd64

    • SHA512

      e9f3f97c85838748b1058e0d521c15f6fcf60ff1b62a6ba59f6b0f13fd05ce5a04f3f1ca0e453034db6bb5e23c05ccae27934134cab432407791f78aa39608a1

    • SSDEEP

      49152:GO2OKOHOQO8OBOQOwOGOVOXOMO7OVOSOiOBOWOsO0OCOLOLOAOqOhOHOYO0O/WrX:/

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • Modifies Windows Defender Real-time Protection settings

    • Modifies visiblity of hidden/system files in Explorer

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Rms family

    • Windows security bypass

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Remote Service Session Hijacking: RDP Hijacking

      Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Server Software Component: Terminal Services DLL

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Stops running service(s)

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies WinLogon

    • Password Policy Discovery

      Attempt to access detailed information about the password policy used within an enterprise network.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • Hide Artifacts: Hidden Users

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks