Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
e6fae4d52ed5450e44b6c16ce80abf4e63cdc25d3e4fc4f55c220cc1b740c2f5.zip
-
Size
30KB
-
Sample
250223-x1bx5avla1
-
MD5
d67e675cc634fa64bdae8e3801b2eb30
-
SHA1
0e9bb20ddb422621c3349b9a8bb2dcfdaff40b08
-
SHA256
7230ed28d9881355ee196933dbc1f280059f14e8efd45d4b555f444bb083e95a
-
SHA512
e76c5cc643c97f315c20a408856f5902174340a2d1c33679f12ffc2aede0dced35cfba4f5eee9d39c14e4a920dca8f7943d0f2cb5a0199a65f09955e350c1cae
-
SSDEEP
768:jsktApcBPc5tCtsT2tY48OOStgC/CtddaGq9Sv:jsgpBPgCyT2VFGdJv
Static task
static1
Behavioral task
behavioral1
Sample
e6fae4d52ed5450e44b6c16ce80abf4e63cdc25d3e4fc4f55c220cc1b740c2f5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e6fae4d52ed5450e44b6c16ce80abf4e63cdc25d3e4fc4f55c220cc1b740c2f5.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
C:\Users\Public\Videos\Open Me!.hta
alt="[email protected]"
href="mailto:[email protected]">[email protected]</a></span> and <span
href="mailto:[email protected]">[email protected]</a></span> and <span
href="mailto:@[email protected]">[email protected]
http://www.w3.org/TR/html4/strict.dtd'>
Extracted
C:\Users\Public\Pictures\Open Me!.hta
alt="[email protected]"
href="mailto:[email protected]">[email protected]</a></span> and <span
href="mailto:[email protected]">[email protected]</a></span> and <span
href="mailto:@[email protected]">[email protected]
http://www.w3.org/TR/html4/strict.dtd'>
Targets
-
-
Target
e6fae4d52ed5450e44b6c16ce80abf4e63cdc25d3e4fc4f55c220cc1b740c2f5.exe
-
Size
55KB
-
MD5
821883525833df75c30d68584716f6fd
-
SHA1
59f8739daa99175ae2a20e38048b1a5d3c5f039a
-
SHA256
e6fae4d52ed5450e44b6c16ce80abf4e63cdc25d3e4fc4f55c220cc1b740c2f5
-
SHA512
d457be30bc2231490e5d430c4eb545a9ef6c1f7bb3c393f28107faab4219d309c190592080aca9ef649a15ef78ddebf0d4f092b4988501b0177e18eb19386ef0
-
SSDEEP
768:wGvvuye1kVtGBk6P/v7nWlHznbkVwrEKD9yDwxVSHrowNI2tG6o/t84B5WpCD+9q:JreytM3alnawrRIwxVSHMweio3dD63o
-
Globeimposter family
-
Renames multiple (8658) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Indicator Removal
1File Deletion
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1