Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
0d56de71fd541b777edbd246e23360cbcab6bddd2ed18ac078fcf29533738a93
-
Size
462KB
-
Sample
250305-ydpfdaxnv7
-
MD5
131d1e05649216da7d3aac86cb0cb1ed
-
SHA1
3fccbf64126d9c4e7880e868722310d4aded9798
-
SHA256
0d56de71fd541b777edbd246e23360cbcab6bddd2ed18ac078fcf29533738a93
-
SHA512
684f670f7b052e32b499164376fb517c665b58d4380ec5df600a1a43c3a904ba07a152f0f1b0705751e3951b2bc0affdb8590663116c3b43853ab7f5d3e039e9
-
SSDEEP
12288:2A9qvbK+YMWshiJurvJXD5ygDziPlHbHL+y6:QvW+6ADJTgyiPlHbr+y6
Static task
static1
Behavioral task
behavioral1
Sample
0d56de71fd541b777edbd246e23360cbcab6bddd2ed18ac078fcf29533738a93.exe
Resource
win10ltsc2021-20250217-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THI$_FILE_C38V3H_.hta
cerber
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THI$_FILE_UL0XMH_.txt
http://p27dokhpz2n7nvgr.onion/9649-5BC0-DA89-0091-B1E5
http://p27dokhpz2n7nvgr.1ms2rx.top/9649-5BC0-DA89-0091-B1E5
http://p27dokhpz2n7nvgr.1j2ien.top/9649-5BC0-DA89-0091-B1E5
http://p27dokhpz2n7nvgr.1nhkou.top/9649-5BC0-DA89-0091-B1E5
http://p27dokhpz2n7nvgr.1a7wnt.top/9649-5BC0-DA89-0091-B1E5
http://p27dokhpz2n7nvgr.1czh7o.top/9649-5BC0-DA89-0091-B1E5
Targets
-
-
Target
0d56de71fd541b777edbd246e23360cbcab6bddd2ed18ac078fcf29533738a93
-
Size
462KB
-
MD5
131d1e05649216da7d3aac86cb0cb1ed
-
SHA1
3fccbf64126d9c4e7880e868722310d4aded9798
-
SHA256
0d56de71fd541b777edbd246e23360cbcab6bddd2ed18ac078fcf29533738a93
-
SHA512
684f670f7b052e32b499164376fb517c665b58d4380ec5df600a1a43c3a904ba07a152f0f1b0705751e3951b2bc0affdb8590663116c3b43853ab7f5d3e039e9
-
SSDEEP
12288:2A9qvbK+YMWshiJurvJXD5ygDziPlHbHL+y6:QvW+6ADJTgyiPlHbr+y6
-
Cerber family
-
Contacts a large (1100) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1