Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
02ff523b0330900767277b319cba76ee33f47d0a71774155613ed6667855adf6
-
Size
193KB
-
Sample
250305-wtppzavxb1
-
MD5
bd25986b516c1aaddff41235af6527fc
-
SHA1
3a786c703627216d6fd5669c50564978dfbea142
-
SHA256
02ff523b0330900767277b319cba76ee33f47d0a71774155613ed6667855adf6
-
SHA512
733ce84cc4b8a7fcdb6c0f817888a5dc0962e108892651f30d7e5e12afdd06c87954fe4ae21fa3339d12901a5bd40110670d0b3a86b53985d7500774a32b0fce
-
SSDEEP
3072:EobNdvzd8bvrHFRZaS0dvOuENbZ53ufBT6WMaGfbs1LuPLTmiXLxwYgBOLFUU0qc:/dJGMwuI18QICPLSmdw3OOU0qs
Static task
static1
Behavioral task
behavioral1
Sample
02ff523b0330900767277b319cba76ee33f47d0a71774155613ed6667855adf6.exe
Resource
win10ltsc2021-20250217-en
Malware Config
Extracted
C:\Users\Admin\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.onion.to/EEBE-C8A2-E55D-0000-0D40
http://cerberhhyed5frqa.onion.cab/EEBE-C8A2-E55D-0000-0D40
http://cerberhhyed5frqa.onion.nu/EEBE-C8A2-E55D-0000-0D40
http://cerberhhyed5frqa.onion.link/EEBE-C8A2-E55D-0000-0D40
http://cerberhhyed5frqa.tor2web.org/EEBE-C8A2-E55D-0000-0D40
http://cerberhhyed5frqa.onion/EEBE-C8A2-E55D-0000-0D40
Extracted
C:\Users\Admin\AppData\Roaming\# DECRYPT MY FILES #.html
Targets
-
-
Target
02ff523b0330900767277b319cba76ee33f47d0a71774155613ed6667855adf6
-
Size
193KB
-
MD5
bd25986b516c1aaddff41235af6527fc
-
SHA1
3a786c703627216d6fd5669c50564978dfbea142
-
SHA256
02ff523b0330900767277b319cba76ee33f47d0a71774155613ed6667855adf6
-
SHA512
733ce84cc4b8a7fcdb6c0f817888a5dc0962e108892651f30d7e5e12afdd06c87954fe4ae21fa3339d12901a5bd40110670d0b3a86b53985d7500774a32b0fce
-
SSDEEP
3072:EobNdvzd8bvrHFRZaS0dvOuENbZ53ufBT6WMaGfbs1LuPLTmiXLxwYgBOLFUU0qc:/dJGMwuI18QICPLSmdw3OOU0qs
-
Cerber family
-
Contacts a large (16402) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
2Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1