Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
14831fbef9a0f594287140b279c209e953c5af0f09df933552d8205bcd8a6964.exe
-
Size
381KB
-
Sample
250312-clwc1atkz7
-
MD5
d75424c803eb7d843e2569a972e2ecc1
-
SHA1
09978cd6a3c99d8e1dacda30a2b53602d4e73832
-
SHA256
14831fbef9a0f594287140b279c209e953c5af0f09df933552d8205bcd8a6964
-
SHA512
d3e8f610f079ce6af10aa17f81e87b871ccbad6492addca00bee2185ff937f2f2f99baead4fb8e26e2b167d5c28c390e5f4cead2b95f27f0badc392edc40114b
-
SSDEEP
6144:NYMBlUgPcOFgqw+0Rs7cqyEcuFIqjHiegfN5n:NYMlUVOFgBEcqjHQNV
Static task
static1
Behavioral task
behavioral1
Sample
14831fbef9a0f594287140b279c209e953c5af0f09df933552d8205bcd8a6964.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
14831fbef9a0f594287140b279c209e953c5af0f09df933552d8205bcd8a6964.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
14831fbef9a0f594287140b279c209e953c5af0f09df933552d8205bcd8a6964.exe
-
Size
381KB
-
MD5
d75424c803eb7d843e2569a972e2ecc1
-
SHA1
09978cd6a3c99d8e1dacda30a2b53602d4e73832
-
SHA256
14831fbef9a0f594287140b279c209e953c5af0f09df933552d8205bcd8a6964
-
SHA512
d3e8f610f079ce6af10aa17f81e87b871ccbad6492addca00bee2185ff937f2f2f99baead4fb8e26e2b167d5c28c390e5f4cead2b95f27f0badc392edc40114b
-
SSDEEP
6144:NYMBlUgPcOFgqw+0Rs7cqyEcuFIqjHiegfN5n:NYMlUVOFgBEcqjHQNV
-
Modifies Windows Defender Real-time Protection settings
-
Modifies firewall policy service
-
Phorphiex family
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Deletes itself
-
Executes dropped EXE
-
Windows security modification
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
4Modify Registry
7