Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
c0dfc434fb3b71fad599144d5d5ca3ca1897b8101b4be3daaf611a047893f06d.exe
-
Size
645KB
-
Sample
250320-elre6aszax
-
MD5
c81bf51e6e148ffcd51c0d0b538d6a19
-
SHA1
5aa0dfa5141306e7bfecbd0ae781f8bb284b53e4
-
SHA256
c0dfc434fb3b71fad599144d5d5ca3ca1897b8101b4be3daaf611a047893f06d
-
SHA512
b4ec4ccec37d71b61dd5873dbc7e994aa86d2450ba97b7e086ddb7578105f4bf0b05cc01605708b95325c31b1d805b94ba05c5fb73b5a74b49a2e33845241bb2
-
SSDEEP
6144:k9DlI5/u8f1mr+4RJ99MpDa52RX5wRDhOOU0qsRyYgv:elYmDXEpDHRXP01yYC
Behavioral task
behavioral1
Sample
c0dfc434fb3b71fad599144d5d5ca3ca1897b8101b4be3daaf611a047893f06d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c0dfc434fb3b71fad599144d5d5ca3ca1897b8101b4be3daaf611a047893f06d.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___UCA5MUU4_.txt
cerber
http://p27dokhpz2n7nvgr.onion/0EDB-2248-EF1B-0446-9EAE
http://p27dokhpz2n7nvgr.12hygy.top/0EDB-2248-EF1B-0446-9EAE
http://p27dokhpz2n7nvgr.14ewqv.top/0EDB-2248-EF1B-0446-9EAE
http://p27dokhpz2n7nvgr.14vvrc.top/0EDB-2248-EF1B-0446-9EAE
http://p27dokhpz2n7nvgr.129p1t.top/0EDB-2248-EF1B-0446-9EAE
http://p27dokhpz2n7nvgr.1apgrn.top/0EDB-2248-EF1B-0446-9EAE
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\_R_E_A_D___T_H_I_S___7LMK_.hta
cerber
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Office\DLP\mip\_R_E_A_D___T_H_I_S___63J9Z_.txt
cerber
http://p27dokhpz2n7nvgr.onion/DDB8-341D-44B1-0446-9D8D
http://p27dokhpz2n7nvgr.12hygy.top/DDB8-341D-44B1-0446-9D8D
http://p27dokhpz2n7nvgr.14ewqv.top/DDB8-341D-44B1-0446-9D8D
http://p27dokhpz2n7nvgr.14vvrc.top/DDB8-341D-44B1-0446-9D8D
http://p27dokhpz2n7nvgr.129p1t.top/DDB8-341D-44B1-0446-9D8D
http://p27dokhpz2n7nvgr.1apgrn.top/DDB8-341D-44B1-0446-9D8D
Targets
-
-
Target
c0dfc434fb3b71fad599144d5d5ca3ca1897b8101b4be3daaf611a047893f06d.exe
-
Size
645KB
-
MD5
c81bf51e6e148ffcd51c0d0b538d6a19
-
SHA1
5aa0dfa5141306e7bfecbd0ae781f8bb284b53e4
-
SHA256
c0dfc434fb3b71fad599144d5d5ca3ca1897b8101b4be3daaf611a047893f06d
-
SHA512
b4ec4ccec37d71b61dd5873dbc7e994aa86d2450ba97b7e086ddb7578105f4bf0b05cc01605708b95325c31b1d805b94ba05c5fb73b5a74b49a2e33845241bb2
-
SSDEEP
6144:k9DlI5/u8f1mr+4RJ99MpDa52RX5wRDhOOU0qsRyYgv:elYmDXEpDHRXP01yYC
-
Cerber family
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Blocklisted process makes network request
-
Contacts a large (1098) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1