Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    66s
  • max time network
    125s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    09/07/2020, 17:19

General

  • Target

    700a1s0ssssd7da.exe

  • Size

    717KB

  • MD5

    3dcb42c5e7545c629c30d501feb908d5

  • SHA1

    9633e564b46262cc03cdd29dc1a7aec468c0757e

  • SHA256

    24ca9e85cfc0b4303facfe25f920917937ed7d5cca7938362417599d8444e159

  • SHA512

    62d7cc702fdbdd11931a652fdb59aaf65cea32eb2ce29029abdfa44eb3c47a4c8b13703b808a68d836b897f6371dcfa3afe3ec3c396f482397ebee99cd99baf2

Score
10/10

Malware Config

Extracted

Path

C:\Boot\bg-BG\Read_Me.txt

Ransom Note
Attention! All your files, documents, photos, databases and other important files are encrypted The only method of recovering files is to purchase an unique decryptor. Only we can give you this decryptor and only we can recover your files. The server with your decryptor is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- 1. Download Tor browser - https://www.torproject.org/ 2. Install Tor browser 3. Open Tor Browser 4. Open link in TOR browser: http://7rzpyw3hflwe2c7h.onion/?ZACEFHIK 5. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. Alternate communication channel here: http://helpqvrg3cc5mvb3.onion/
URLs

http://7rzpyw3hflwe2c7h.onion/?ZACEFHIK

http://helpqvrg3cc5mvb3.onion/

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Enumerates connected drives 3 TTPs
  • Drops desktop.ini file(s) 3 IoCs
  • Modifies registry class 7 IoCs
  • Modifies control panel 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 5468 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 9720 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\700a1s0ssssd7da.exe
    "C:\Users\Admin\AppData\Local\Temp\700a1s0ssssd7da.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetThreadContext
    PID:976
    • C:\Users\Admin\AppData\Local\Temp\700a1s0ssssd7da.exe
      "{path}"
      2⤵
        PID:3900
      • C:\Users\Admin\AppData\Local\Temp\700a1s0ssssd7da.exe
        "{path}"
        2⤵
        • Drops desktop.ini file(s)
        • Suspicious behavior: EnumeratesProcesses
        • Drops file in Program Files directory
        PID:3928
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Modifies registry class
      • Modifies control panel
      • Suspicious use of AdjustPrivilegeToken
      PID:3952

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3928-0-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/3928-2-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB