Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
23s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
03/03/2021, 11:35
Static task
static1
Behavioral task
behavioral1
Sample
KMSAuto Net.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
KMSAuto Net.exe
Resource
win10v20201028
General
-
Target
KMSAuto Net.exe
-
Size
2.1MB
-
MD5
26d067caae83528460ed322ae8cf7ab9
-
SHA1
470f0522a5debbbeb0a8d5c3e0a3dc1af6a1344f
-
SHA256
564c6d1973910e06c66670708fdc809d7391d03fd65d5e71d6d154f898429c93
-
SHA512
7f8c96f52f9e01985da14169c836cf0a7878580c312b6ba4b22b7b36fd2324b64deedab8f21221cae744ce0c3c55e6e0bfbcb4c78ffd8cac03b2c1c5fa9e0e81
Malware Config
Extracted
C:\Users\Admin\Desktop\HOW_TO_RESTORE_FILES.txt
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1640 SWEfghd678hfjbbhbGFrca.exe 1720 loader.exe -
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\CompressStop.tif.ySabA6ghnJp loader.exe File created C:\Users\Admin\Pictures\RemoveStop.tiff.ySabA6ghnJp loader.exe File created C:\Users\Admin\Pictures\SetConvertFrom.raw.ySabA6ghnJp loader.exe File created C:\Users\Admin\Pictures\UninstallReceive.raw.ySabA6ghnJp loader.exe File created C:\Users\Admin\Pictures\WaitFind.tif.ySabA6ghnJp loader.exe File created C:\Users\Admin\Pictures\AddUnlock.tif.ySabA6ghnJp loader.exe File created C:\Users\Admin\Pictures\BackupInvoke.tiff.ySabA6ghnJp loader.exe -
Loads dropped DLL 6 IoCs
pid Process 2028 KMSAuto Net.exe 1640 SWEfghd678hfjbbhbGFrca.exe 1640 SWEfghd678hfjbbhbGFrca.exe 1640 SWEfghd678hfjbbhbGFrca.exe 1640 SWEfghd678hfjbbhbGFrca.exe 1720 loader.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: loader.exe File opened (read-only) \??\B: loader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 1788 NOTEPAD.EXE 272 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1720 loader.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1640 2028 KMSAuto Net.exe 26 PID 2028 wrote to memory of 1640 2028 KMSAuto Net.exe 26 PID 2028 wrote to memory of 1640 2028 KMSAuto Net.exe 26 PID 2028 wrote to memory of 1640 2028 KMSAuto Net.exe 26 PID 2028 wrote to memory of 788 2028 KMSAuto Net.exe 27 PID 2028 wrote to memory of 788 2028 KMSAuto Net.exe 27 PID 2028 wrote to memory of 788 2028 KMSAuto Net.exe 27 PID 2028 wrote to memory of 788 2028 KMSAuto Net.exe 27 PID 1640 wrote to memory of 1720 1640 SWEfghd678hfjbbhbGFrca.exe 29 PID 1640 wrote to memory of 1720 1640 SWEfghd678hfjbbhbGFrca.exe 29 PID 1640 wrote to memory of 1720 1640 SWEfghd678hfjbbhbGFrca.exe 29 PID 1640 wrote to memory of 1720 1640 SWEfghd678hfjbbhbGFrca.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\KMSAuto Net.exe"C:\Users\Admin\AppData\Local\Temp\KMSAuto Net.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Roaming\SWEfghd678hfjbbhbGFrca.exe"C:\Users\Admin\AppData\Roaming\SWEfghd678hfjbbhbGFrca.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"3⤵
- Executes dropped EXE
- Modifies extensions of user files
- Loads dropped DLL
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:1720
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\selfdstr.bat" "2⤵PID:788
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1072
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\HOW_TO_RESTORE_FILES.txt1⤵
- Opens file in notepad (likely ransom note)
PID:272
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\HOW_TO_RESTORE_FILES.txt1⤵
- Opens file in notepad (likely ransom note)
PID:1788