Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
3e45d849d08f65c21f1bd509fc2a7e6dd7459f5f00b513662dd4274f1a41f315
-
Size
1.8MB
-
Sample
250316-aadmpswwbz
-
MD5
e0fb0a46e065bbab1834bf5d1c3a8057
-
SHA1
e1f7fb6fa51a874b48f2b7b7e8ae488b6980b0cd
-
SHA256
3e45d849d08f65c21f1bd509fc2a7e6dd7459f5f00b513662dd4274f1a41f315
-
SHA512
2136ca6d85975833bea7894c4ed0f6f3d2e893aa5a75ef446df9266fcdcc7eac8d2e75387a7a7def83b0702ba68cbef03ed1b047d0ec9afc5b4cfdc934b5e24c
-
SSDEEP
12288:p99Vbpgx4OuE+aCpBPY0PkI686WNUfWO6yuXzT5SPlSGN/A7W2FeDSIGVH/KIDgN:r1gg4CppEI6GGfWDkCQDbGV6eH81kO
Behavioral task
behavioral1
Sample
3e45d849d08f65c21f1bd509fc2a7e6dd7459f5f00b513662dd4274f1a41f315.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3e45d849d08f65c21f1bd509fc2a7e6dd7459f5f00b513662dd4274f1a41f315.exe
Resource
win10v2004-20250313-en
Malware Config
Targets
-
-
Target
3e45d849d08f65c21f1bd509fc2a7e6dd7459f5f00b513662dd4274f1a41f315
-
Size
1.8MB
-
MD5
e0fb0a46e065bbab1834bf5d1c3a8057
-
SHA1
e1f7fb6fa51a874b48f2b7b7e8ae488b6980b0cd
-
SHA256
3e45d849d08f65c21f1bd509fc2a7e6dd7459f5f00b513662dd4274f1a41f315
-
SHA512
2136ca6d85975833bea7894c4ed0f6f3d2e893aa5a75ef446df9266fcdcc7eac8d2e75387a7a7def83b0702ba68cbef03ed1b047d0ec9afc5b4cfdc934b5e24c
-
SSDEEP
12288:p99Vbpgx4OuE+aCpBPY0PkI686WNUfWO6yuXzT5SPlSGN/A7W2FeDSIGVH/KIDgN:r1gg4CppEI6GGfWDkCQDbGV6eH81kO
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4