Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
CircusSpoofer.py
-
Size
157KB
-
Sample
250313-bgdfysyzfs
-
MD5
3b4e4c0c5fc4553bfe8e0812cf0d6315
-
SHA1
26bf91e03966cfe0ab142dcb865a41220cae269a
-
SHA256
218bb2350579eb698341183f06cd53b0dbe42b6654a98f4d84ee423875d582a4
-
SHA512
5d29169f221f53c53a9d809361bce8ee1b13da52be1c3480e3ee153d8f20fd32b7ba80799ba09264693302be3b28ca1dd53b547e5b23be6b6bd765ff1168a93c
-
SSDEEP
1536:v9BcQj04+KYojiDqHQotp4FCC1ollo85GzCOrZr26TLdoac/lnlxIZ0:vPX04+SjiWazCCZr2YAJnIZ0
Static task
static1
Behavioral task
behavioral1
Sample
CircusSpoofer.py
Resource
win11-20250217-en
Malware Config
Extracted
C:\Users\Admin\Downloads\!Please Read Me!.txt
wannacry
15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1
Targets
-
-
Target
CircusSpoofer.py
-
Size
157KB
-
MD5
3b4e4c0c5fc4553bfe8e0812cf0d6315
-
SHA1
26bf91e03966cfe0ab142dcb865a41220cae269a
-
SHA256
218bb2350579eb698341183f06cd53b0dbe42b6654a98f4d84ee423875d582a4
-
SHA512
5d29169f221f53c53a9d809361bce8ee1b13da52be1c3480e3ee153d8f20fd32b7ba80799ba09264693302be3b28ca1dd53b547e5b23be6b6bd765ff1168a93c
-
SSDEEP
1536:v9BcQj04+KYojiDqHQotp4FCC1ollo85GzCOrZr26TLdoac/lnlxIZ0:vPX04+SjiWazCCZr2YAJnIZ0
-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
Badrabbit family
-
Wannacry family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Office macro that triggers on suspicious action
Office document macro which triggers in special circumstances - often malicious.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
3Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1