Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
106b5428dd82...c1.exe
windows7-x64
106b5428dd82...c1.exe
windows10-2004-x64
106b6755ca1b...7b.exe
windows7-x64
106b6755ca1b...7b.exe
windows10-2004-x64
106b96951c0d...e8.exe
windows7-x64
106b96951c0d...e8.exe
windows10-2004-x64
106b990bdc11...15.exe
windows7-x64
36b990bdc11...15.exe
windows10-2004-x64
36bcf962809...67.exe
windows7-x64
106bcf962809...67.exe
windows10-2004-x64
106bf4d95191...d6.exe
windows7-x64
106bf4d95191...d6.exe
windows10-2004-x64
106c17f80a5a...33.exe
windows7-x64
106c17f80a5a...33.exe
windows10-2004-x64
76c25a9ad3a...ff.exe
windows7-x64
106c25a9ad3a...ff.exe
windows10-2004-x64
106c46d70788...18.exe
windows7-x64
106c46d70788...18.exe
windows10-2004-x64
106c5038f87e...dc.exe
windows7-x64
106c5038f87e...dc.exe
windows10-2004-x64
106c53fda3cb...65.exe
windows7-x64
106c53fda3cb...65.exe
windows10-2004-x64
106c79c2f450...b4.exe
windows7-x64
106c79c2f450...b4.exe
windows10-2004-x64
106ca3cb8c05...9a.exe
windows7-x64
106ca3cb8c05...9a.exe
windows10-2004-x64
106cb59f599a...bf.exe
windows7-x64
106cb59f599a...bf.exe
windows10-2004-x64
106ccb172e66...df.exe
windows7-x64
106ccb172e66...df.exe
windows10-2004-x64
106cdf89e8d2...1d.exe
windows7-x64
106cdf89e8d2...1d.exe
windows10-2004-x64
10General
-
Target
archive_26.zip
-
Size
20.4MB
-
Sample
250322-gydqyatjx5
-
MD5
117e1b4d97ed28b842d06ec232abbaaa
-
SHA1
d8823d801df272026b992073afcba5b6e0c3fc73
-
SHA256
525209de288e36bab56d3a19446249ffd067c8757b5d5870daa6a782b9567e74
-
SHA512
134fdfe1345917dc081b5703515c555b36c0cb508585ba8a19a1e7feb80fab9b17f8daefbf1ae1b893b4b934920d866c259922737c9024bf1b534974cfe82c2f
-
SSDEEP
393216:psNpZIyhuAs7AgWNfsNp+33gWNfsNpZgme5OyhuAs71dHTS3j6RsBWTGjedGBg/Y:wqyQ37APa+33PaZg9OyQ373zSz6uIwl
Behavioral task
behavioral1
Sample
6b5428dd828c35d7783578dcbf39f9c1.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6b5428dd828c35d7783578dcbf39f9c1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
6b6755ca1bb4486fb7501572a580e96343181ff957605ea150f7d94beabef27b.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
6b6755ca1bb4486fb7501572a580e96343181ff957605ea150f7d94beabef27b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
6b96951c0d2a6e97c54c030298a7eee8.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
6b96951c0d2a6e97c54c030298a7eee8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
6b990bdc11976a009c1a3ccda05849bebff003ab1a3c6096c0603249d7374c15.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
6b990bdc11976a009c1a3ccda05849bebff003ab1a3c6096c0603249d7374c15.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
6bcf96280909b8139cf7fb517241d0b12c45f7fa2f1681cb7bc9caac33ef5867.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
6bcf96280909b8139cf7fb517241d0b12c45f7fa2f1681cb7bc9caac33ef5867.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral11
Sample
6bf4d95191becc3a5f28dc233d702cd6.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
6bf4d95191becc3a5f28dc233d702cd6.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
6c17f80a5a74741689d6145a1e7dca2a7ba13e52fab6e37e2c3240bb47ac7133.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
6c17f80a5a74741689d6145a1e7dca2a7ba13e52fab6e37e2c3240bb47ac7133.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
6c25a9ad3a7149deae7bb50429c9fefe20b60a59914bd7b63174796b640adfff.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
6c25a9ad3a7149deae7bb50429c9fefe20b60a59914bd7b63174796b640adfff.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
6c46d70788b60ff0ba7ea4c5f0549f18.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
6c46d70788b60ff0ba7ea4c5f0549f18.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
6c5038f87e96a5799d1221ec35527d35fb454d450bff95dc0bf5b0b813183edc.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
6c5038f87e96a5799d1221ec35527d35fb454d450bff95dc0bf5b0b813183edc.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral21
Sample
6c53fda3cb5c0cb93d53eff2fa6433a8679aedcdccf5b8487f4294e897bd2365.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
6c53fda3cb5c0cb93d53eff2fa6433a8679aedcdccf5b8487f4294e897bd2365.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
6c79c2f450da5e97631c33ddce170bb4.exe
Resource
win7-20250207-en
Behavioral task
behavioral24
Sample
6c79c2f450da5e97631c33ddce170bb4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
6ca3cb8c056b4e81c7a8a885e150b7efb068a36f38a023cb6e07f5640a62ad9a.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
6ca3cb8c056b4e81c7a8a885e150b7efb068a36f38a023cb6e07f5640a62ad9a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
6cb59f599a4d87e0a3e34f264f3d87e410ab436afadcd02e1fe516ac8e4534bf.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
6cb59f599a4d87e0a3e34f264f3d87e410ab436afadcd02e1fe516ac8e4534bf.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
6ccb172e6696a44a0b3a581df57d89df.exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
6ccb172e6696a44a0b3a581df57d89df.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
6cdf89e8d2c2fb9a5db53881f501181d.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
6cdf89e8d2c2fb9a5db53881f501181d.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
njrat
0.7d
HacKed
karar.zapto.org:5552
aali13212.ddns.net:1177
3dbbe2f6f55a97d83ab7d4bc110d85ae
-
reg_key
3dbbe2f6f55a97d83ab7d4bc110d85ae
-
splitter
|'|'|
Extracted
umbral
https://discord.com/api/webhooks/1351627813622382762/XO-i9V99ZfT3bor00mzvZutTgvituXMW9diuoaaE_eCCEjHsOQbLe6frJYhtkL-Xi2cM
Extracted
xworm
necessary-sit.gl.at.ply.gg:64980
127.0.0.1:5800
floor-steam.gl.at.ply.gg:58684
-
Install_directory
%AppData%
-
install_file
XClient.exe
-
pastebin_url
https://pastebin.com/raw/e8sX6uF7
Extracted
xworm
3.1
127.0.0.1:305
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
quasar
1.4.1
Office04
192.168.1.183:4782
b9f5ebb9-1d21-4817-9b2d-b875e3c921a9
-
encryption_key
C7562C2DA4E62FA9B3C65168CC2EBA463DFC7C34
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Settings
-
subdirectory
SubDir
Extracted
nanocore
1.2.2.0
4af74541-e3f1-469c-8af7-efe4071b81cf
-
activate_away_mode
false
-
backup_connection_host
178.32.224.116
- backup_dns_server
-
buffer_size
65535
-
build_time
2018-07-28T12:59:38.488799236Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
46218
-
default_group
tourex
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
4af74541-e3f1-469c-8af7-efe4071b81cf
-
mutex_timeout
5000
-
prevent_system_sleep
false
- primary_connection_host
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Boy12345#
Targets
-
-
Target
6b5428dd828c35d7783578dcbf39f9c1.exe
-
Size
23KB
-
MD5
6b5428dd828c35d7783578dcbf39f9c1
-
SHA1
c0b92a72a6c1640e29d1705fc5533b75bb2a2220
-
SHA256
8f55442c491081691e0a713840813490aee9e3fb62a2d2d24c1c98f879dc7610
-
SHA512
e62049e6d4ce1dac983978b01fe2224fd0959f6fca08dd04024fe688da26bdd9301ebd0c86e8cde08169d786b33932815359078660cad49eab6a89216e5f28e7
-
SSDEEP
384:AsqS+ER6vRKXGYKRWVSujUtX9w6Dglo61Z5DVmRvR6JZlbw8hqIusZzZIiF:Xf65K2Yf1jKRpcnuy
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
-
-
Target
6b6755ca1bb4486fb7501572a580e96343181ff957605ea150f7d94beabef27b.exe
-
Size
401KB
-
MD5
5caa4902ecea464d3d96da57af2945bd
-
SHA1
530d15e868487a82c345e9dda60e5465894834c0
-
SHA256
6b6755ca1bb4486fb7501572a580e96343181ff957605ea150f7d94beabef27b
-
SHA512
f4370bd4c9d4909099427ddbf9b500d65c701289040a16dd56e1cb79a8407bff86b22d566c94adc01f24773edc2b26dcd21bd8f64cde32e19b79f8bf36d49259
-
SSDEEP
6144:FsEM9IugZckJLDWVAUGk3WMg/NpM3/2X0cIQL3nUt+xa98beFqLAjk04:3LDWebk3WMsNpM3/26QL32wOqL70
-
Detect Umbral payload
-
Umbral family
-
-
-
Target
6b96951c0d2a6e97c54c030298a7eee8.exe
-
Size
2.0MB
-
MD5
6b96951c0d2a6e97c54c030298a7eee8
-
SHA1
b45a1dccfd3fd08ac1da5c07e1a99325bd065b04
-
SHA256
2a3a882623b0d348b21d49896b7a2cbad63b13954eca283f3251607b83aea999
-
SHA512
47db06283115aad1f78195e98971987f2c12634327fdeb3e48f56fdfece729567af5ef47010b718f42949f270127cb2f603c91bb25af3790cc55f3879123e61b
-
SSDEEP
49152:7rYU+Yy4J8jao9UVlWAOjhRzsiYHjo++xTN:7dxVJC9UqRzsu+8N
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
-
-
Target
6b990bdc11976a009c1a3ccda05849bebff003ab1a3c6096c0603249d7374c15.exe
-
Size
95KB
-
MD5
fe0a5b7680fe0aa9817d90944bbca7ab
-
SHA1
064614065deb46d85fe6ddf816a0ccc404065fb9
-
SHA256
6b990bdc11976a009c1a3ccda05849bebff003ab1a3c6096c0603249d7374c15
-
SHA512
12bb0ac392735ff3804c9424e9317f5250073c32498d76f654d19e9bdacf3793598e1c9fdbcab99df09dfab112e288a372e3e5aefa47c46a6406461f0d04202f
-
SSDEEP
1536:ndKcfHO9lxXtN7aOx+p1C4oLXD6/OZR3hFvjeuKst/HZDPEPX3:5fqvXtO+zQgHZUX3
Score3/10 -
-
-
Target
6bcf96280909b8139cf7fb517241d0b12c45f7fa2f1681cb7bc9caac33ef5867.exe
-
Size
229KB
-
MD5
c43fa6e8e418363f5b9bd2bac94e03ac
-
SHA1
4e557326d845f150c37e71d23f2e816942f6f53c
-
SHA256
6bcf96280909b8139cf7fb517241d0b12c45f7fa2f1681cb7bc9caac33ef5867
-
SHA512
1535626a7d98e33546f04623c7a405ded146a273422934d47c15f6862dc988212776b27270cf25434704dbf31a22dea5049e0b735b1861645e54510aa1f103ac
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD4qCslEKtFucr20VJgqAb8e1mND8i:noZtL+EP8qCslEKtFucr20VJgDYx
-
Detect Umbral payload
-
Umbral family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
6bf4d95191becc3a5f28dc233d702cd6.exe
-
Size
76KB
-
MD5
6bf4d95191becc3a5f28dc233d702cd6
-
SHA1
125de49ff0b005dec68cd38685509627d951da38
-
SHA256
55096b58d57b4f1dd2ac3e51993f4fd4e674dd014f55a214c59ea3cebeecc8c1
-
SHA512
287347132de904e3e1d217773de69e9a445b570d2de277bdd134843c735b5b1b9927f412429cda9868fccde2b9fc8deb958ba8744788434d006da87421f3f5c6
-
SSDEEP
1536:OveMR3U1PXkxJm3cIGt/xCLWbXGfEuiITW6B9eOvrGpnkKW:O2TBBpGt/aWbXXareOvrGpkKW
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
6c17f80a5a74741689d6145a1e7dca2a7ba13e52fab6e37e2c3240bb47ac7133.exe
-
Size
418KB
-
MD5
552b5d6980369b3c7b29fc25cd763251
-
SHA1
4743845b971bb5003d6f30741f61171243ff5c75
-
SHA256
6c17f80a5a74741689d6145a1e7dca2a7ba13e52fab6e37e2c3240bb47ac7133
-
SHA512
22fcaa454e979ff01b979d8d3845d0bb771615313a9fbc3cc062a332c9743b00bdba977dc6ddd247a0832a62fe0bc4ec064f0b68a6d9713751e2eb6688263710
-
SSDEEP
6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RUwbvk:ITNYrnE3bm/CiejewY5vX8
-
Nanocore family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Suspicious use of SetThreadContext
-
-
-
Target
6c25a9ad3a7149deae7bb50429c9fefe20b60a59914bd7b63174796b640adfff.exe
-
Size
359KB
-
MD5
940f934bbb0f83a1565250113e0b6bb5
-
SHA1
9de96f718f5fb4e0f9da17ca7c9a235244063e88
-
SHA256
6c25a9ad3a7149deae7bb50429c9fefe20b60a59914bd7b63174796b640adfff
-
SHA512
7a010a7621b71036f271f4fcb7d9b84d1162e45109931d5c27d2ed8a4aab0d21477e012a6c54eaea31b7aefaa6803209b79aaedae3f01f31c560d9bbc3b75e13
-
SSDEEP
6144:IUEkEIkj1Osfi2Owt0wJBzxmywv82bsmnEzeyZIxW/QwoBikWbz+/shAJhUI+dD:RXVYi2Om0kWywv82bsmse6KW/QwoBikN
-
Asyncrat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
-
-
Target
6c46d70788b60ff0ba7ea4c5f0549f18.exe
-
Size
1.9MB
-
MD5
6c46d70788b60ff0ba7ea4c5f0549f18
-
SHA1
10cd8b050891004ca06c2be54d55e38a243be162
-
SHA256
f4b884338e802040f828153f0a161ab18205ee0a90b8f778831900c7ae97c465
-
SHA512
c156dfae670696f766ef3672e3513f7c0f66460674cb78c4419b876f36128e593fc9a8be6923d752116f855d3334df65bbc8f26010aee9d8c8d6e4db430ee81a
-
SSDEEP
24576:kz4T3bMX0/0ZqSEaa3OVFu8VQTo8Ia29MSVyAXmFPf87ptY60/YYhdbh7JRj:kOMX0/08SVYTcxMXPxthD
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
UAC bypass
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks whether UAC is enabled
-
-
-
Target
6c5038f87e96a5799d1221ec35527d35fb454d450bff95dc0bf5b0b813183edc.exe
-
Size
2.0MB
-
MD5
c93b34043bcbac0c9fe8449ec0195a62
-
SHA1
711c89581f4cefa1c4cb2a26714bdd32bbbb675c
-
SHA256
6c5038f87e96a5799d1221ec35527d35fb454d450bff95dc0bf5b0b813183edc
-
SHA512
1a522d161cb7c7f4dfbf66c508f92af7de9f99015042363a116a411ff27b02c39d714ad77ad22dd01e0d24b100407a124be0a1f7d67cee25b6bfd70df25ec1e9
-
SSDEEP
49152:TrYU+Yy4J8jao9UVlWAOjhRzsiYHjo++xTN:TdxVJC9UqRzsu+8N
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
-
-
Target
6c53fda3cb5c0cb93d53eff2fa6433a8679aedcdccf5b8487f4294e897bd2365.exe
-
Size
764KB
-
MD5
0a76d68bea5929f73e9eb1bb40eb2aa6
-
SHA1
04e6c1b66b67c381f4cdaf7574a40e7c1c4a4da7
-
SHA256
6c53fda3cb5c0cb93d53eff2fa6433a8679aedcdccf5b8487f4294e897bd2365
-
SHA512
0c941c61355dd0ba7cc8bfe4a5e367685d0adc8082def183e6d9202c766bcb4394447d3ea7f17e83e1b170df66e9d0ddeb7c54adb578031bab0da37e5be129a6
-
SSDEEP
6144:RtT/Yq3v9Auky+4dusAIFB++velibxPyp/64wjOjn6cB3rcnKHr:b6u7+487IFjvelQypyfy7cnKHr
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
6c79c2f450da5e97631c33ddce170bb4.exe
-
Size
999KB
-
MD5
6c79c2f450da5e97631c33ddce170bb4
-
SHA1
b0356c1821709ae9a5fd99e6573125fc8b58f2b4
-
SHA256
152965f868c6784be4f3845d34c32e9159566067bd8a7265d57c7a7003c24c75
-
SHA512
1372d8e9aced9e4f6e1ae0f7ec503e7e956028f59ec3ee7b9e5109938e8683d8eaae2a82b729640d21164a12b2cbeed2cf991d5c1feaa8bda2ece21887b1a757
-
SSDEEP
12288:H9pLLk45WSSY1BX6f4bIS7rMNetPfC9Vs6IFGs0jxAqXj9xPSI0dzNgCoD7WX+Iu:H9pP5WS3lrMNyC9TJPCXBi
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
6ca3cb8c056b4e81c7a8a885e150b7efb068a36f38a023cb6e07f5640a62ad9a.exe
-
Size
2.0MB
-
MD5
0671fb2e25b5550c73a99fef148dcffc
-
SHA1
f5d82c36648dd1f6581f9496651c3193cbba9831
-
SHA256
6ca3cb8c056b4e81c7a8a885e150b7efb068a36f38a023cb6e07f5640a62ad9a
-
SHA512
0785b23e6c79d72e9de9bb22770b82fa53f31c814683eaa64ed3469301a6878a7dead9dcecb79b32e73f6fdf6fcd853a3586e6dc8b346e13b068599189b92232
-
SSDEEP
49152:7rYU+Yy4J8jao9UVlWAOjhRzsiYHjo++xTN:7dxVJC9UqRzsu+8N
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
-
-
Target
6cb59f599a4d87e0a3e34f264f3d87e410ab436afadcd02e1fe516ac8e4534bf.exe
-
Size
947KB
-
MD5
71be25bbab9c0b3aa327bb9f3295f64a
-
SHA1
bb60b8263a3c45397f48730b0b2283b5e8a144e2
-
SHA256
6cb59f599a4d87e0a3e34f264f3d87e410ab436afadcd02e1fe516ac8e4534bf
-
SHA512
44e5fcb1c0827df4a422d88e724c701662d94ed9169d2b8cf5f1547b2f3000c94eb99243bdb6a4395690213e4245bc3c3374d4331d2f9284f50c20f1bc0d575f
-
SSDEEP
12288:8z7IFjvelQypyfy7z6u7+4DvbMUsIvOc2:8z0FfMz6TEbMUs8OD
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
6ccb172e6696a44a0b3a581df57d89df.exe
-
Size
81KB
-
MD5
6ccb172e6696a44a0b3a581df57d89df
-
SHA1
a825c4935c099c2e1156b30f515eb5d259ea4b45
-
SHA256
6e176afe39f0f0b1fd80c209b377e51b034cd4dc2a0c14e45383f6df9ac654bd
-
SHA512
f31fa90bab909e3ecfc6467cb2b9974537e381ff02e1dae86d66f42eafcb482fae3a25c8edb9fa64e58d0912c61a4f353d25c226b582a1981e2080d4b99dd4a3
-
SSDEEP
1536:VBL8NxWydtYKAJ0SRGbSuvXnbMa6Mi3Oi2lNJrh:3Ymze9bSuvrxi3OiKJ9
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
6cdf89e8d2c2fb9a5db53881f501181d.exe
-
Size
1.9MB
-
MD5
6cdf89e8d2c2fb9a5db53881f501181d
-
SHA1
558eda84922e9824a2554414f5f049658d742575
-
SHA256
d3f54d4b32b7125991bc4a5543f24c536e16c8ac77eba12aad61256817d7ea97
-
SHA512
65f11caefff09248fef65676f439dc665fb9a540dc6faf90d7b318859c4f4b7cffe7e74de8f57296420a9e051cc929aecf55c509f6c933f5d53c0af43bf61cfd
-
SSDEEP
24576:kz4T3bMX0/0ZqSEaa3OVFu8VQTo8Ia29MSVyAXmFPf87ptY60/YYhdbh7JRj:kOMX0/08SVYTcxMXPxthD
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
UAC bypass
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks whether UAC is enabled
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1