Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

23/03/2025, 19:10

250323-xvmsfa11gt 10

23/03/2025, 18:49

250323-xglyzsvn17 8

23/03/2025, 18:23

250323-w1gb6str12 8

23/03/2025, 18:13

250323-wtvk8azwcy 8

23/03/2025, 18:01

250323-wlzvzatlz3 10

23/03/2025, 17:38

250323-v722saywcy 10

23/03/2025, 17:35

250323-v53kjayve1 10

23/03/2025, 17:27

250323-v1pswasnw2 10

23/03/2025, 15:05

250323-sf8n5sylt7 8

23/03/2025, 14:52

250323-r8x8faxrx9 8

General

  • Target

    EICAR.txt

  • Size

    68B

  • Sample

    250323-wlzvzatlz3

  • MD5

    44d88612fea8a8f36de82e1278abb02f

  • SHA1

    3395856ce81f2b7382dee72602f798b642f14140

  • SHA256

    275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f

  • SHA512

    cc805d5fab1fd71a4ab352a9c533e65fb2d5b885518f4e565e68847223b8e6b85cb48f3afad842726d99239c9e36505c64b0dc9a061d9e507d833277ada336ab

Malware Config

Targets

    • Target

      EICAR.txt

    • Size

      68B

    • MD5

      44d88612fea8a8f36de82e1278abb02f

    • SHA1

      3395856ce81f2b7382dee72602f798b642f14140

    • SHA256

      275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f

    • SHA512

      cc805d5fab1fd71a4ab352a9c533e65fb2d5b885518f4e565e68847223b8e6b85cb48f3afad842726d99239c9e36505c64b0dc9a061d9e507d833277ada336ab

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Detects MyDoom family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • MyDoom

      MyDoom is a Worm that is written in C++.

    • Mydoom family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Boot or Logon Autostart Execution: Print Processors

      Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Legitimate hosting services abused for malware hosting/C2

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Modifies WinLogon

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks