Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
PO-M4590 LIST ALL.exe
-
Size
15KB
-
Sample
250310-s4sylazm19
-
MD5
985f3c04ab5dec516b8af607024d2bc2
-
SHA1
9cbb9e9700ad7df8132d923cd93297184323b8ff
-
SHA256
32f9313de2f9bbd302b973cff2027bac0f5a6435445497bab7a1d7b72659f6cf
-
SHA512
8508cb5d6cb5f6d9ed104fd5697d9a4110d6b6c9ced79626cb2f3cb3879bffbf3f92638da8039b6889f20cdab5e543e54d1622082400af838279be8f9b892868
-
SSDEEP
384:K4088/msYh7dWPaO1qOptpDeAzAkKIblRAfOvZ:3VLWiOIOpq0xRAfOB
Static task
static1
Behavioral task
behavioral1
Sample
PO-M4590 LIST ALL.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
PO-M4590 LIST ALL.exe
-
Size
15KB
-
MD5
985f3c04ab5dec516b8af607024d2bc2
-
SHA1
9cbb9e9700ad7df8132d923cd93297184323b8ff
-
SHA256
32f9313de2f9bbd302b973cff2027bac0f5a6435445497bab7a1d7b72659f6cf
-
SHA512
8508cb5d6cb5f6d9ed104fd5697d9a4110d6b6c9ced79626cb2f3cb3879bffbf3f92638da8039b6889f20cdab5e543e54d1622082400af838279be8f9b892868
-
SSDEEP
384:K4088/msYh7dWPaO1qOptpDeAzAkKIblRAfOvZ:3VLWiOIOpq0xRAfOB
-
Detect Xworm Payload
-
StormKitty payload
-
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1