Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    21744533483.zip

  • Size

    1.9MB

  • Sample

    250313-nmcg3a1xe1

  • MD5

    a7a50f848ee6e052f7cda35707fd0743

  • SHA1

    c0a6eb37fb847b735c177f9bbc81226a0dde6fff

  • SHA256

    a32d35c527d278679bf19e45eb6f5841ad501f9e97da65dc6b5dade3ac762767

  • SHA512

    606752671304f15bc32e7299865f85484478682b3091360f1c2941ffaf2a74ed42242c8af4cd7a08333f94b6bf2856f2012f0d8af0de4df3d9415ef04cfd5402

  • SSDEEP

    49152:oIdzdgqd8wowhM7gSK6t5EFdzadTYx+M49dCFej/1LDjGbc8s:ldzuAoHK6EFdzbwl94FM/1LfGQZ

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1

Targets

    • Target

      edd23d9fccfb6d00bfe4c572f49e539e1a03a84ab985a84ec0d09ce8d85899fa

    • Size

      2.5MB

    • MD5

      54ea05f72d85e81abc662f81717b3a6e

    • SHA1

      10cc7c97b12808c6d0011d24a5213ce315b6ad0e

    • SHA256

      edd23d9fccfb6d00bfe4c572f49e539e1a03a84ab985a84ec0d09ce8d85899fa

    • SHA512

      2b9fee3fd73c357345d61b3a642031cf38a1f4723ee377e318bb14f1a47954a7c229dc26da793cd3d6ab1ab5f565ed85aab402ca2047a7fd0e1f705944558290

    • SSDEEP

      49152:cd8rheMFBvkc7Ti6PHckz0GepoCUnaw4Xmf7Em9sFqa:s

    • ServHelper

      ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.

    • Servhelper family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Remote Service Session Hijacking: RDP Hijacking

      Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.

    • Blocklisted process makes network request

    • Indicator Removal: Network Share Connection Removal

      Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.

    • Modifies RDP port number used by Windows

    • Possible privilege escalation attempt

    • Server Software Component: Terminal Services DLL

    • Deletes itself

    • Loads dropped DLL

    • Modifies file permissions

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks