Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
21744533483.zip
-
Size
1.9MB
-
Sample
250313-nmcg3a1xe1
-
MD5
a7a50f848ee6e052f7cda35707fd0743
-
SHA1
c0a6eb37fb847b735c177f9bbc81226a0dde6fff
-
SHA256
a32d35c527d278679bf19e45eb6f5841ad501f9e97da65dc6b5dade3ac762767
-
SHA512
606752671304f15bc32e7299865f85484478682b3091360f1c2941ffaf2a74ed42242c8af4cd7a08333f94b6bf2856f2012f0d8af0de4df3d9415ef04cfd5402
-
SSDEEP
49152:oIdzdgqd8wowhM7gSK6t5EFdzadTYx+M49dCFej/1LDjGbc8s:ldzuAoHK6EFdzbwl94FM/1LfGQZ
Static task
static1
Behavioral task
behavioral1
Sample
edd23d9fccfb6d00bfe4c572f49e539e1a03a84ab985a84ec0d09ce8d85899fa.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edd23d9fccfb6d00bfe4c572f49e539e1a03a84ab985a84ec0d09ce8d85899fa.ps1
Resource
win10v2004-20250217-en
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Targets
-
-
Target
edd23d9fccfb6d00bfe4c572f49e539e1a03a84ab985a84ec0d09ce8d85899fa
-
Size
2.5MB
-
MD5
54ea05f72d85e81abc662f81717b3a6e
-
SHA1
10cc7c97b12808c6d0011d24a5213ce315b6ad0e
-
SHA256
edd23d9fccfb6d00bfe4c572f49e539e1a03a84ab985a84ec0d09ce8d85899fa
-
SHA512
2b9fee3fd73c357345d61b3a642031cf38a1f4723ee377e318bb14f1a47954a7c229dc26da793cd3d6ab1ab5f565ed85aab402ca2047a7fd0e1f705944558290
-
SSDEEP
49152:cd8rheMFBvkc7Ti6PHckz0GepoCUnaw4Xmf7Em9sFqa:s
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Servhelper family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Remote Service Session Hijacking: RDP Hijacking
Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.
-
Blocklisted process makes network request
-
Indicator Removal: Network Share Connection Removal
Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.
-
Modifies RDP port number used by Windows
-
Possible privilege escalation attempt
-
Server Software Component: Terminal Services DLL
-
Deletes itself
-
Loads dropped DLL
-
Modifies file permissions
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Server Software Component
1Terminal Services DLL
1Defense Evasion
File and Directory Permissions Modification
1Indicator Removal
2File Deletion
1Network Share Connection Removal
1Modify Registry
1Discovery
Permission Groups Discovery
1Local Groups
1System Information Discovery
1