Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
lossless scaling.zip
-
Size
5.5MB
-
Sample
250312-l4gr1aylx2
-
MD5
7cad413146081f6315d82b1dfbebc256
-
SHA1
5ef84bec1e3b9d5c62a95b08ac133991a1951bf4
-
SHA256
653c00ae23b0d0001ab2d962daef99c15dbc83b3c676b9f79249ebd757c78d2e
-
SHA512
e82b5caf11830d2dfef2b8d8c3a5eed116e68ed3f9b4259953155f8474e682bb56b3b7d9e64d8e07b4acf5c22540eb3620a3199e79c161c0eb705ea11179ae74
-
SSDEEP
98304:Uyf2ZCmbGVSS7jQ3TyQfVp2EhpyZ6DVvpnPqf7waG159wwo2QOWIAeukWahTDCQM:/mUSS7M3TyQfzyZ0dtdm2QbIAeqa5mr5
Static task
static1
Behavioral task
behavioral1
Sample
lossless scaling.zip
Resource
win11-20250217-en
Behavioral task
behavioral2
Sample
lossless scaling.iso
Resource
win11-20250217-en
Malware Config
Extracted
asyncrat
A 14
Default
puka1.work.gd:408
puka1.ddnsfree.com:408
ramdan.mywire.org:408
MaterxMutex_Egypt408
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
lossless scaling.zip
-
Size
5.5MB
-
MD5
7cad413146081f6315d82b1dfbebc256
-
SHA1
5ef84bec1e3b9d5c62a95b08ac133991a1951bf4
-
SHA256
653c00ae23b0d0001ab2d962daef99c15dbc83b3c676b9f79249ebd757c78d2e
-
SHA512
e82b5caf11830d2dfef2b8d8c3a5eed116e68ed3f9b4259953155f8474e682bb56b3b7d9e64d8e07b4acf5c22540eb3620a3199e79c161c0eb705ea11179ae74
-
SSDEEP
98304:Uyf2ZCmbGVSS7jQ3TyQfVp2EhpyZ6DVvpnPqf7waG159wwo2QOWIAeukWahTDCQM:/mUSS7M3TyQfzyZ0dtdm2QbIAeqa5mr5
-
Asyncrat family
-
UAC bypass
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
-
-
Target
lossless scaling.iso
-
Size
14.4MB
-
MD5
46e9759569770db40c6c79e94daf651a
-
SHA1
f77fff018270806ed77f9c71ee0fa87e8aac5667
-
SHA256
2bac7f7bf574784293615140b68dd8e3d0b76ea75be410e9136f269d21db6252
-
SHA512
368b654b84ea71eef3329612165b823bcb5b3cc3797dfa15f004b93b0d046247543ec779e274ce3acbdbc83d2fba7ef0c5e4d06b34588bf4de4b529f17b1a5a5
-
SSDEEP
98304:w3ow+ZLQNfbs8jsGBVdR5vZjUV+XXoYUZ1ZLQN3bs8jsGBVdR5vZjUV+XXoYUZ:wCQNjs8j9B3v1FXXeQNLs8j9B3v1FXX
Score3/10 -
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1