Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
241s -
max time network
240s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
08/12/2020, 16:23
Static task
static1
Behavioral task
behavioral1
Sample
exec.bat
Resource
win7v20201028
General
-
Target
exec.bat
-
Size
91B
-
MD5
4804ff55b6d42529e570c4133b0df987
-
SHA1
d4ea6ffa38244ca4e2f6fb3f46d383bb0b32f689
-
SHA256
47ef845da3ad6d91e3737f382fad54cde9a6a1671c8a1a012525141f38614c4a
-
SHA512
0ba598a394d007bccf2f6ea923f0ee348be1ea3707bca5a45a1be63b3846d3eb259383fa18c3dbf1fda28c42f70224a97a019a1fe8a6be30f56e49587748cb1c
Malware Config
Extracted
C:\RECOVER-FILES.txt
http://egregor4u5ipdzhv.onion/EF07F95C874E8BF1
https://egregor.top/EF07F95C874E8BF1
Signatures
-
Egregor Ransomware
Variant of the Sekhmet ransomware first seen in September 2020.
-
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\SetConvertFrom.raw => C:\Users\Admin\Pictures\SetConvertFrom.raw.HhPv rundll32.exe File renamed C:\Users\Admin\Pictures\UninstallReceive.raw => C:\Users\Admin\Pictures\UninstallReceive.raw.HhPv rundll32.exe File renamed C:\Users\Admin\Pictures\BackupInvoke.tiff => C:\Users\Admin\Pictures\BackupInvoke.tiff.lKxB rundll32.exe File renamed C:\Users\Admin\Pictures\CompressStop.tif => C:\Users\Admin\Pictures\CompressStop.tif.lKxB rundll32.exe File renamed C:\Users\Admin\Pictures\PushMount.crw => C:\Users\Admin\Pictures\PushMount.crw.rxeKAR rundll32.exe File opened for modification C:\Users\Admin\Pictures\RemoveStop.tiff rundll32.exe File renamed C:\Users\Admin\Pictures\RemoveStop.tiff => C:\Users\Admin\Pictures\RemoveStop.tiff.rxeKAR rundll32.exe File renamed C:\Users\Admin\Pictures\WaitFind.tif => C:\Users\Admin\Pictures\WaitFind.tif.HhPv rundll32.exe File renamed C:\Users\Admin\Pictures\AddUnlock.tif => C:\Users\Admin\Pictures\AddUnlock.tif.lKxB rundll32.exe File opened for modification C:\Users\Admin\Pictures\BackupInvoke.tiff rundll32.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e6189640.lnk rundll32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RECOVER-FILES.txt rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\RECOVER-FILES.txt rundll32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\e6189640.lnk rundll32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\RECOVER-FILES.txt rundll32.exe File created C:\Program Files\RECOVER-FILES.txt rundll32.exe File created C:\Program Files (x86)\RECOVER-FILES.txt rundll32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\e6189640.lnk rundll32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\RECOVER-FILES.txt rundll32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\e6189640.lnk rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\RECOVER-FILES.txt rundll32.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1228 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 976 vssvc.exe Token: SeRestorePrivilege 976 vssvc.exe Token: SeAuditPrivilege 976 vssvc.exe Token: SeDebugPrivilege 1228 rundll32.exe Token: SeDebugPrivilege 1228 rundll32.exe Token: SeDebugPrivilege 1228 rundll32.exe Token: SeDebugPrivilege 1228 rundll32.exe Token: SeDebugPrivilege 1228 rundll32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1100 1668 cmd.exe 27 PID 1668 wrote to memory of 1100 1668 cmd.exe 27 PID 1668 wrote to memory of 1100 1668 cmd.exe 27 PID 1100 wrote to memory of 1228 1100 rundll32.exe 25 PID 1100 wrote to memory of 1228 1100 rundll32.exe 25 PID 1100 wrote to memory of 1228 1100 rundll32.exe 25 PID 1100 wrote to memory of 1228 1100 rundll32.exe 25 PID 1100 wrote to memory of 1228 1100 rundll32.exe 25 PID 1100 wrote to memory of 1228 1100 rundll32.exe 25 PID 1100 wrote to memory of 1228 1100 rundll32.exe 25
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\exec.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b.dll,DllRegisterServer --pass2police --full2⤵
- Suspicious use of WriteProcessMemory
PID:1100
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b.dll,DllRegisterServer --pass2police --full1⤵
- Modifies extensions of user files
- Drops startup file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:1228
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:976