Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    ZoomInstallerFull.exe

  • Size

    153.7MB

  • Sample

    250228-d5vq9a1jw2

  • MD5

    2d392d1cf33d790976f11fe651ecc11d

  • SHA1

    d0a03907a1961704d6aeef2a5e63e442a1b2f6cd

  • SHA256

    e3180f2fa14ec09d2771b497f5dad94873d1d83bd98be8e5217f48694d1282b5

  • SHA512

    a9be16f4defbb12747402a1b6e0c2d367e4ced7f8c882f0de0c8b4f054c16e415a416764a6093fb48bebd90183e2c22e22e36a583f9187f984706e04020d70ac

  • SSDEEP

    3145728:K1QZ5XsB4NjIwWXQe1bH82UWi81W09r0Q+7WJJ4jYiVdRHbwZlVDzRsc3bvlVKt:yq02+QmgWi81LZ0Q+m4X2ZP3xVM

Malware Config

Targets

    • Target

      ZoomInstallerFull.exe

    • Size

      153.7MB

    • MD5

      2d392d1cf33d790976f11fe651ecc11d

    • SHA1

      d0a03907a1961704d6aeef2a5e63e442a1b2f6cd

    • SHA256

      e3180f2fa14ec09d2771b497f5dad94873d1d83bd98be8e5217f48694d1282b5

    • SHA512

      a9be16f4defbb12747402a1b6e0c2d367e4ced7f8c882f0de0c8b4f054c16e415a416764a6093fb48bebd90183e2c22e22e36a583f9187f984706e04020d70ac

    • SSDEEP

      3145728:K1QZ5XsB4NjIwWXQe1bH82UWi81W09r0Q+7WJJ4jYiVdRHbwZlVDzRsc3bvlVKt:yq02+QmgWi81LZ0Q+m4X2ZP3xVM

    • Detects HijackLoader (aka IDAT Loader)

    • HijackLoader

      HijackLoader is a multistage loader first seen in 2023.

    • Hijackloader family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks