Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
2eff58738b5a7717a3fcdf7a4171c6fa18492bc200eddc26bf608fa35d28466e
-
Size
197KB
-
Sample
250306-war1zsvk17
-
MD5
d9828d5bbd8818ac94fb7b65891fa969
-
SHA1
45b9f13c9ba87d6199e730f6d863ddde925a0db4
-
SHA256
2eff58738b5a7717a3fcdf7a4171c6fa18492bc200eddc26bf608fa35d28466e
-
SHA512
b3eb5c5958b259c715bbf67eff54b995f73c543e3b65d7b54a51c7377d2b1ff6553950dfca8593e90e98d641b99dbfb86931d2a054eb4225ac0be4bbc9d0440c
-
SSDEEP
3072:UjVZw9zj+3objKhZHUsitUQobeUXnR51Y4:MEx+39hPitUfXZY
Static task
static1
Behavioral task
behavioral1
Sample
2eff58738b5a7717a3fcdf7a4171c6fa18492bc200eddc26bf608fa35d28466e.exe
Resource
win10ltsc2021-20250217-en
Malware Config
Extracted
C:\Users\Admin\Desktop\info.hta
http://www.w3.org/TR/html4/strict.dtd'>
Targets
-
-
Target
2eff58738b5a7717a3fcdf7a4171c6fa18492bc200eddc26bf608fa35d28466e
-
Size
197KB
-
MD5
d9828d5bbd8818ac94fb7b65891fa969
-
SHA1
45b9f13c9ba87d6199e730f6d863ddde925a0db4
-
SHA256
2eff58738b5a7717a3fcdf7a4171c6fa18492bc200eddc26bf608fa35d28466e
-
SHA512
b3eb5c5958b259c715bbf67eff54b995f73c543e3b65d7b54a51c7377d2b1ff6553950dfca8593e90e98d641b99dbfb86931d2a054eb4225ac0be4bbc9d0440c
-
SSDEEP
3072:UjVZw9zj+3objKhZHUsitUQobeUXnR51Y4:MEx+39hPitUfXZY
-
Phobos family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (302) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Windows Firewall
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
3File Deletion
3Modify Registry
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1