Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
Infected.exe
-
Size
63KB
-
Sample
250317-y72mssxycs
-
MD5
7b95fc50b453f9f32fdbdfc533913178
-
SHA1
66a9fef38f777a4ec3990913800a682d2c2707f6
-
SHA256
3e1659e4ec253e1377e6c142e33e71f13b8c7d0021f0dab2178fd9610ec18214
-
SHA512
7fb8efa7471fdefe3a8fc9f7ca80c7c182a4319e428d28e42ccedecf4e772322f587a2545202bc94e7b3c13c4916d4c655d55b81792e771b6ec4211ca285a07f
-
SSDEEP
768:Cm0vnfEXf78awC8A+XU2azcBRL5JTk1+T4KSBGHmDbD/ph0oXiaBtFSPWSusdpqM:qEXiLdSJYUbdh9VuusdpqKmY7
Behavioral task
behavioral1
Sample
Infected.exe
Resource
win10ltsc2021-20250314-en
Malware Config
Extracted
asyncrat
Default
get-rick.gl.at.ply.gg:1504
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Infected.exe
-
Size
63KB
-
MD5
7b95fc50b453f9f32fdbdfc533913178
-
SHA1
66a9fef38f777a4ec3990913800a682d2c2707f6
-
SHA256
3e1659e4ec253e1377e6c142e33e71f13b8c7d0021f0dab2178fd9610ec18214
-
SHA512
7fb8efa7471fdefe3a8fc9f7ca80c7c182a4319e428d28e42ccedecf4e772322f587a2545202bc94e7b3c13c4916d4c655d55b81792e771b6ec4211ca285a07f
-
SSDEEP
768:Cm0vnfEXf78awC8A+XU2azcBRL5JTk1+T4KSBGHmDbD/ph0oXiaBtFSPWSusdpqM:qEXiLdSJYUbdh9VuusdpqKmY7
-
Asyncrat family
-
Stealerium family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Renames multiple (3676) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates processes with tasklist
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Peripheral Device Discovery
2Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
4System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1