Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
Malware-1.zip
-
Size
2.9MB
-
Sample
250210-slchwsvrdj
-
MD5
a386e71b8cd97c0ddd6872681e09fc8c
-
SHA1
19d8d786c52c05ac4d8a9061789df77f6ee3902a
-
SHA256
fd88f0d2ab93ab3cb3506998e4f68b82663d237313bc208b17729cc343cbcdef
-
SHA512
4ba977efb712ccc0167bee77dc9e309f2d43eac04beb429cae82c8df6bbda9f6451c16b0929756c169ddb3b9f9cd9f86eacbea88fe399b8f5a185a87945bcf67
-
SSDEEP
49152:LgGLewJiuENNv4y4hvc4RGzE93LoVCXOdKFxgrRUKdSre6i9zb/RTHht/oFU97S1:cG/cuED4nVHQgoCFONdSi6KzjCOETB
Static task
static1
Behavioral task
behavioral1
Sample
Run-Malware-1.bat
Resource
win10v2004-20250129-en
Behavioral task
behavioral2
Sample
Run-Malware-1.bat
Resource
win10ltsc2021-20250207-en
Malware Config
Extracted
bumblebee
9090
-
dga_seed
-5372979216912523469
-
domain_length
10
-
num_dga_domains
300
-
port
443
Targets
-
-
Target
Run-Malware-1.bat
-
Size
93B
-
MD5
78505553b5950323c47742bb01c50eda
-
SHA1
6e677c8644f361f70dbeff52b1504cc49062cb05
-
SHA256
1867cb519da175fa8dc5b26c86e1ea384342d95c1d172dcceb92073ec70c8cf7
-
SHA512
80f3b9a445d5a93c0057f43645efb11667c15c166c9493c0bf48691437412ebcd43c8bb25cbf27f01c846a3978f5f30b4c6ee3c6056ba4bf073aa5d9a43f8510
-
Bumblebee family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1