Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Bank Swift Payment.bat.exe

  • Size

    505KB

  • Sample

    250313-p1jnzawjt6

  • MD5

    6157bd9e1f8f34619e222262a71b79cd

  • SHA1

    31818fbc3eec3c641f28bbcf94c59dea97f1cacf

  • SHA256

    3c7f61519b46af007450df7ef19b49df3a8b60d0b7c4fd82112068994262be6e

  • SHA512

    17118d382e8b07696d3a5c7ae8a869ed8cf1e88bde780c907662a2b1f33de8ec58a9dfdb080251b61dc0e7f21435644c34c3aa0282dcd5878dd30818606ccaf5

  • SSDEEP

    12288:85MOiV1JqhSvYg7IYU/2UPkY1Gp3/B/dQ/Wb8T2DQDs:85MOiX3A9zjM3jQ/Wb8aD+s

Malware Config

Targets

    • Target

      Bank Swift Payment.bat.exe

    • Size

      505KB

    • MD5

      6157bd9e1f8f34619e222262a71b79cd

    • SHA1

      31818fbc3eec3c641f28bbcf94c59dea97f1cacf

    • SHA256

      3c7f61519b46af007450df7ef19b49df3a8b60d0b7c4fd82112068994262be6e

    • SHA512

      17118d382e8b07696d3a5c7ae8a869ed8cf1e88bde780c907662a2b1f33de8ec58a9dfdb080251b61dc0e7f21435644c34c3aa0282dcd5878dd30818606ccaf5

    • SSDEEP

      12288:85MOiV1JqhSvYg7IYU/2UPkY1Gp3/B/dQ/Wb8T2DQDs:85MOiX3A9zjM3jQ/Wb8aD+s

    • Modifies Windows Defender DisableAntiSpyware settings

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks