Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
WinWord.ex
-
Size
6.9MB
-
Sample
250226-1vg4qsvsbs
-
MD5
389390bf696737deedaaf10a90d407d1
-
SHA1
87758da2fe832f302032e904eb13994c70023825
-
SHA256
d3f31c512033046c4209c5af1352f3ce36d1af39f84946c22ca3e25da6539734
-
SHA512
4b1ff3b939a22250222afc6ded49e636b76cc602ea67a587a70dac2deafabf5446f1eb27feb688b3d7759b9b4bcd46f016c8f98b42cba29920045031da6551b0
-
SSDEEP
196608:I/9sLB5t3JJQGR2nroh1L9cDIw4v6N+ED6JwtPnoDAMzvaqx/D:u6tdJ2rIcIw4vjbJCfoF+KD
Static task
static1
Behavioral task
behavioral1
Sample
WinWord.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
WinWord.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1038709348303650857/DLQdA51dlH2mWOgr-jjNC0jvu25-oWapgKwxpsqsFwOSYLm4gQOEdFE6XXg7_sReK0AB
Targets
-
-
Target
WinWord.ex
-
Size
6.9MB
-
MD5
389390bf696737deedaaf10a90d407d1
-
SHA1
87758da2fe832f302032e904eb13994c70023825
-
SHA256
d3f31c512033046c4209c5af1352f3ce36d1af39f84946c22ca3e25da6539734
-
SHA512
4b1ff3b939a22250222afc6ded49e636b76cc602ea67a587a70dac2deafabf5446f1eb27feb688b3d7759b9b4bcd46f016c8f98b42cba29920045031da6551b0
-
SSDEEP
196608:I/9sLB5t3JJQGR2nroh1L9cDIw4v6N+ED6JwtPnoDAMzvaqx/D:u6tdJ2rIcIw4vjbJCfoF+KD
-
DarkTrack payload
-
Darktrack family
-
Stealerium family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Modifies file permissions
-
Checks whether UAC is enabled
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2