Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    84s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    09/07/2020, 17:19

General

  • Target

    700a1s0ssssd7da.exe

  • Size

    717KB

  • MD5

    3dcb42c5e7545c629c30d501feb908d5

  • SHA1

    9633e564b46262cc03cdd29dc1a7aec468c0757e

  • SHA256

    24ca9e85cfc0b4303facfe25f920917937ed7d5cca7938362417599d8444e159

  • SHA512

    62d7cc702fdbdd11931a652fdb59aaf65cea32eb2ce29029abdfa44eb3c47a4c8b13703b808a68d836b897f6371dcfa3afe3ec3c396f482397ebee99cd99baf2

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0011-0000-1000-0000000FF1CE}-C\Read_Me.txt

Ransom Note
Attention! All your files, documents, photos, databases and other important files are encrypted The only method of recovering files is to purchase an unique decryptor. Only we can give you this decryptor and only we can recover your files. The server with your decryptor is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- 1. Download Tor browser - https://www.torproject.org/ 2. Install Tor browser 3. Open Tor Browser 4. Open link in TOR browser: http://7rzpyw3hflwe2c7h.onion/?LLLLLLLL 5. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. Alternate communication channel here: http://helpqvrg3cc5mvb3.onion/
URLs

http://7rzpyw3hflwe2c7h.onion/?LLLLLLLL

http://helpqvrg3cc5mvb3.onion/

Signatures

  • Suspicious use of WriteProcessMemory 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 4530 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Modifies service 2 TTPs 4 IoCs
  • Drops startup file 1 IoCs
  • Suspicious use of FindShellTrayWindow 81 IoCs
  • Suspicious use of SendNotifyMessage 93 IoCs
  • Loads dropped DLL 42 IoCs
  • Registers COM server for autorun 1 TTPs 24 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Drops file in Windows directory 44 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops desktop.ini file(s) 41 IoCs
  • Enumerates connected drives 3 TTPs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of AdjustPrivilegeToken 1005 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Modifies registry class 234 IoCs
  • Drops file in Program Files directory 12075 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\700a1s0ssssd7da.exe
    "C:\Users\Admin\AppData\Local\Temp\700a1s0ssssd7da.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetThreadContext
    PID:1432
    • C:\Users\Admin\AppData\Local\Temp\700a1s0ssssd7da.exe
      "{path}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Drops startup file
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      PID:1708
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies service
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Drops desktop.ini file(s)
    • Suspicious use of AdjustPrivilegeToken
    • Modifies Installed Components in the registry
    • Modifies registry class
    PID:1220
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of WriteProcessMemory
    • Registers COM server for autorun
    • Modifies data under HKEY_USERS
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Modifies registry class
    PID:1396
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding A40E2ED04E2727DBF153C427B2E52957
      2⤵
      • Loads dropped DLL
      PID:984
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding D94CB1BBA7F37124BD5E31A4633499A1
      2⤵
      • Loads dropped DLL
      PID:1844
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 5EA55115B4AAB63381E115DC40A8431C M Global\MSI0000
      2⤵
      • Loads dropped DLL
      PID:916
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C1854D035F208C0574468F8E241C7052 M Global\MSI0000
      2⤵
      • Suspicious use of WriteProcessMemory
      • Loads dropped DLL
      PID:1852
      • C:\Windows\syswow64\wevtutil.exe
        "wevtutil.exe" im "C:\Program Files\Microsoft Office\Office14\BCSEvents.man"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:620
        • C:\Windows\System32\wevtutil.exe
          "wevtutil.exe" im "C:\Program Files\Microsoft Office\Office14\BCSEvents.man" /fromwow64
          4⤵
            PID:1840
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of AdjustPrivilegeToken
      • Modifies Installed Components in the registry
      • Modifies registry class
      PID:1620
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Modifies Installed Components in the registry
      • Modifies registry class
      PID:608
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Modifies service
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Modifies Installed Components in the registry
      • Modifies registry class
      PID:1572

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/608-29-0x0000000008D60000-0x0000000008D64000-memory.dmp

      Filesize

      16KB

    • memory/608-28-0x0000000003920000-0x0000000003921000-memory.dmp

      Filesize

      4KB

    • memory/608-30-0x0000000004560000-0x0000000004564000-memory.dmp

      Filesize

      16KB

    • memory/1220-3-0x0000000004350000-0x0000000004351000-memory.dmp

      Filesize

      4KB

    • memory/1220-4-0x0000000009850000-0x0000000009854000-memory.dmp

      Filesize

      16KB

    • memory/1220-5-0x0000000005290000-0x0000000005294000-memory.dmp

      Filesize

      16KB

    • memory/1220-6-0x0000000005290000-0x0000000005294000-memory.dmp

      Filesize

      16KB

    • memory/1396-85-0x00000000010D0000-0x00000000010D4000-memory.dmp

      Filesize

      16KB

    • memory/1396-84-0x00000000013F0000-0x00000000013F4000-memory.dmp

      Filesize

      16KB

    • memory/1396-153-0x00000000013F0000-0x00000000013F4000-memory.dmp

      Filesize

      16KB

    • memory/1396-152-0x00000000010D0000-0x00000000010D4000-memory.dmp

      Filesize

      16KB

    • memory/1396-150-0x0000000005B80000-0x0000000005B84000-memory.dmp

      Filesize

      16KB

    • memory/1396-136-0x0000000005B80000-0x0000000005B84000-memory.dmp

      Filesize

      16KB

    • memory/1396-137-0x0000000005B80000-0x0000000005B84000-memory.dmp

      Filesize

      16KB

    • memory/1396-102-0x00000000010D0000-0x00000000010D4000-memory.dmp

      Filesize

      16KB

    • memory/1396-95-0x00000000010D0000-0x00000000010D4000-memory.dmp

      Filesize

      16KB

    • memory/1396-113-0x00000000010D0000-0x00000000010D4000-memory.dmp

      Filesize

      16KB

    • memory/1572-38-0x00000000039D0000-0x00000000039D1000-memory.dmp

      Filesize

      4KB

    • memory/1572-37-0x00000000039D0000-0x00000000039D1000-memory.dmp

      Filesize

      4KB

    • memory/1572-154-0x00000000039D0000-0x00000000039D1000-memory.dmp

      Filesize

      4KB

    • memory/1620-25-0x0000000003B60000-0x0000000003B61000-memory.dmp

      Filesize

      4KB

    • memory/1620-23-0x0000000003B60000-0x0000000003B61000-memory.dmp

      Filesize

      4KB

    • memory/1708-0-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/1708-2-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB