Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
205901f209731db929cc89e93d986dd5025aabc25c57ad4e342ba21d175aab96.vbs
-
Size
25KB
-
Sample
250322-e1wcnaxyav
-
MD5
4b45ab4778ed8bf951c470d5ae0e550c
-
SHA1
5bc0146efccad916625ac9bf231f511fd8a7f5d1
-
SHA256
bc4707c1d81c7978cf963c26b3cc69585cb8aaa8e4b5859cc4688220db88f9d0
-
SHA512
a1368167d731d2587158ecc1b104b8e410da305adb58bfe556e4cf1b8421009260cf119ba7dade1ea833fa3628d801507daee08c897d9d0150d7e64dcb38ef80
-
SSDEEP
384:y8enbIbpBStxYUQHSH7l+ix/J/b6GvPCSy+tNywUWZEC:inucJb6HAUvC
Static task
static1
Behavioral task
behavioral1
Sample
205901f209731db929cc89e93d986dd5025aabc25c57ad4e342ba21d175aab96.vbs
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
205901f209731db929cc89e93d986dd5025aabc25c57ad4e342ba21d175aab96.vbs
Resource
win10v2004-20250314-en
Malware Config
Extracted
phorphiex
http://185.215.113.66/
http://45.93.20.18/
TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6
qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
rsXCXBf9SagxV8JfC12d8Bybk84oPdMNN9
AULzfBuUAPfCGAXoG5Vq14aP9s6fx3AH4Z
LdgchXq1sKbAaAJ1EXAPSRBzLb8jnTZstT
MP8GEm8QpYgQYaMo8oM5NQhRBgDGiLZW5Q
4AtjkCVKbtEC3UEN77SQHuH9i1XkzNiRi5VCbA2XGsJh46nJSXfGQn4GjLuupCqmC57Lo7LvKmFUyRfhtJSvKvuw3h9ReKK
XryzFMFVpDUvU7famUGf214EXD3xNUSmQf
0xCa90599132C4D88907Bd8E046540284aa468a035
15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC
1BzmrjmKPKSR2hH5BeJySfiVA676E8DYaK
ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp
3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc
3ESHude8zUHksQg1h6hHmzY79BS36L91Yn
CSLKveRL2zqkbV2TqiFVuW6twtpqgFajoUZLAJQTTQk2
DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA
t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh
stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj
bnb1msyt0djx4ecspfxg5en0ye465kg3kmv9utzml2
bc1ppypcmu3684n648gyj62gjp2rw0xy7w3vwfamatlg29ajp4z52desafa0sr
bc1qc9edl4hzl9jyt8twdad3zjeh2df2znq96tdezd
GBQJMXYXPRIWFMXIFJR35ZB7LRKMB4PHCIUAUFR3TKUL6RDBZVLZEUJ3
bitcoincash:qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
-
mutex
k9ubbn6sdfs
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36
Extracted
phorphiex
http://185.215.113.66
Targets
-
-
Target
205901f209731db929cc89e93d986dd5025aabc25c57ad4e342ba21d175aab96.vbs
-
Size
25KB
-
MD5
4b45ab4778ed8bf951c470d5ae0e550c
-
SHA1
5bc0146efccad916625ac9bf231f511fd8a7f5d1
-
SHA256
bc4707c1d81c7978cf963c26b3cc69585cb8aaa8e4b5859cc4688220db88f9d0
-
SHA512
a1368167d731d2587158ecc1b104b8e410da305adb58bfe556e4cf1b8421009260cf119ba7dade1ea833fa3628d801507daee08c897d9d0150d7e64dcb38ef80
-
SSDEEP
384:y8enbIbpBStxYUQHSH7l+ix/J/b6GvPCSy+tNywUWZEC:inucJb6HAUvC
-
Modifies WinLogon for persistence
-
Phorphiex family
-
Phorphiex payload
-
UAC bypass
-
Xmrig family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Creates new service(s)
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Event Triggered Execution: Image File Execution Options Injection
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
2Service Execution
2Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
2Disable or Modify Tools
1Indicator Removal
4Clear Persistence
1File Deletion
3Modify Registry
6