Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
19022025_0711_sample.exe
-
Size
481KB
-
Sample
250219-hz6c1szqcr
-
MD5
bd6e69713ccfdbc9e9486bfabf135128
-
SHA1
cd57d85db99bcb948a089b09902ad093708ff90e
-
SHA256
11840e492551afa910f38f3077881db2556d97de174d2bbf239b8bb0b5f1d02f
-
SHA512
5bd041c55bb551023a65cc69e78d442311386267e170e0f6c7bda9aeffae4277ddc6496183dca1f3d96f2e8b060555c266612e1384af6af229f41c6a0c5085e7
-
SSDEEP
6144:suQ7u0a0Lgb2mzHy2ZkFlqe1u5hDimntgNqtOq:sRayLk3zHtkFlD1SfOq
Static task
static1
Behavioral task
behavioral1
Sample
19022025_0711_sample.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
19022025_0711_sample.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
C:\info.hta
http://www.w3.org/TR/html4/strict.dtd'>
Extracted
C:\info.hta
http://www.w3.org/TR/html4/strict.dtd'>
Targets
-
-
Target
19022025_0711_sample.exe
-
Size
481KB
-
MD5
bd6e69713ccfdbc9e9486bfabf135128
-
SHA1
cd57d85db99bcb948a089b09902ad093708ff90e
-
SHA256
11840e492551afa910f38f3077881db2556d97de174d2bbf239b8bb0b5f1d02f
-
SHA512
5bd041c55bb551023a65cc69e78d442311386267e170e0f6c7bda9aeffae4277ddc6496183dca1f3d96f2e8b060555c266612e1384af6af229f41c6a0c5085e7
-
SSDEEP
6144:suQ7u0a0Lgb2mzHy2ZkFlqe1u5hDimntgNqtOq:sRayLk3zHtkFlD1SfOq
-
Phobos family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (316) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Windows Firewall
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
3File Deletion
3Modify Registry
2