Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
viruses.7z
-
Size
58.0MB
-
Sample
250211-hh8rtazjes
-
MD5
b53cfcb8be406b2e948a7237db455b98
-
SHA1
cbf66d0120b28690578b02462bf31d2c9eff5d9f
-
SHA256
6f55f3d21550efb245e1208922f24195f31737591d1c493553a989be80eec0dd
-
SHA512
4245d32db250c759aefc271864aed9280ba28e52da99f9d630ffb8e8547057829da7052cd2d098645ca129357411e394e5dfc36ddb7b3d1f4f103e323c3c8b0e
-
SSDEEP
1572864:fpyk0ehdG1JDwT+4iWi82yGDVMAQuYSn3cA1:RF0ehGwT+Qi8HGxMA4mc+
Behavioral task
behavioral1
Sample
passwd.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
passwd.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
szczur.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
szczur.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
passwd.exe
-
Size
10.0MB
-
MD5
6c7345f80de6e0d5b32351be100a2279
-
SHA1
f5ef6f10a2cab097997fddfa891a728119900549
-
SHA256
36c3f97c77b6cc7871006ed40962ad8812389ce4d26787579789340820a6a135
-
SHA512
3823fdeeef994b68bba37b463e383585a455932637f0dd167e9fd018a3bf1445855c34432b90fe5fe32447853ad94a026578da3010c2db4a8b2742acb7fff04b
-
SSDEEP
196608:zWc0ejQ3SfeNTfm/pf+xk4dWRimrbW3jmyr:uCcy/pWu4kRimrbmy8
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
szczur.exe
-
Size
60.0MB
-
MD5
9b7a4089dbad1e1e2b8a2a148ac3a74d
-
SHA1
3aec6c418e70a5d2f5addbaa7095ce66e0a40aaf
-
SHA256
f5a543375778ed6ecd291be0c20651f0b176271cd0d48ccab7506d5a9b1f3f31
-
SHA512
e88384fbe0c048b35bf78fb6408ed6d9bc44898258a80bb4e417be8bd7c69dc1491f6132919237426b445718dffeec786655ab3a20c3fc049064bf5071c485e2
-
SSDEEP
1572864:w2GKlEWjAOkiqOv8im2AzJE7Bbli0aVrwO:wnKa9OknOv8i3mSw0apw
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
3Hidden Files and Directories
3Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1File and Directory Discovery
1Process Discovery
1Query Registry
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1Virtualization/Sandbox Evasion
1