Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
35s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
26/07/2021, 12:39
Static task
static1
Behavioral task
behavioral1
Sample
d96950d14352749542917183d25c38234c7ab5249062d913ff88516077eadbab.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
d96950d14352749542917183d25c38234c7ab5249062d913ff88516077eadbab.sample.exe
Resource
win10v20210408
General
-
Target
d96950d14352749542917183d25c38234c7ab5249062d913ff88516077eadbab.sample.exe
-
Size
682KB
-
MD5
45ec8fc71ee99d25db903a68ca7f5ec3
-
SHA1
d460fc45d2355d352e60c1e95b0156f69487372e
-
SHA256
d96950d14352749542917183d25c38234c7ab5249062d913ff88516077eadbab
-
SHA512
85cf082b781aad9a6feed6969b2de3bee578fb1e5a3f96ba5d44b37c976e11be7097ed9eb206c4534f1b9e0ceff57ffd6cf00fb7c56144323b50d65c3dde8b5e
Malware Config
Extracted
C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-ouygjrd.txt
http://jssestaew3e7ao3q.onion.cab
http://jssestaew3e7ao3q.tor2web.org
http://jssestaew3e7ao3q.onion/
Extracted
C:\Users\Admin\Documents\!Decrypt-All-Files-ouygjrd.txt
http://jssestaew3e7ao3q.onion.cab
http://jssestaew3e7ao3q.tor2web.org
http://jssestaew3e7ao3q.onion/
Extracted
C:\ProgramData\ummcbbc.html
http://jssestaew3e7ao3q.onion.cab
http://jssestaew3e7ao3q.tor2web.org
http://jssestaew3e7ao3q.onion
Signatures
-
CTB-Locker
Ransomware family which uses Tor to hide its C2 communications.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 4 IoCs
pid Process 1200 exusltb.exe 880 exusltb.exe 1092 exusltb.exe 1992 exusltb.exe -
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Windows\Temp\laaaaaaa.tmp => C:\Users\Admin\Pictures\UnblockSuspend.RAW.ouygjrd svchost.exe File renamed C:\Windows\Temp\laaaaaaa.tmp => C:\Users\Admin\Pictures\ReceiveCompare.CRW.ouygjrd svchost.exe File renamed C:\Windows\Temp\laaaaaaa.tmp => C:\Users\Admin\Pictures\UnpublishSync.RAW.ouygjrd svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Control Panel\International\Geo\Nation exusltb.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat exusltb.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Documents\\!Decrypt-All-Files-ouygjrd.bmp" Explorer.EXE -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 916 set thread context of 1968 916 d96950d14352749542917183d25c38234c7ab5249062d913ff88516077eadbab.sample.exe 27 PID 1200 set thread context of 880 1200 exusltb.exe 32 PID 1092 set thread context of 1992 1092 exusltb.exe 37 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-ouygjrd.txt svchost.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-ouygjrd.bmp svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 544 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main exusltb.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch exusltb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" exusltb.exe -
Modifies data under HKEY_USERS 19 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{efb60be4-9a04-11eb-be03-806e6f6e6963} svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\ = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Full = "%SystemRoot%\\System32\\imageres.dll,-54" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WallpaperStyle = "0" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{efb60be4-9a04-11eb-be03-806e6f6e6963}\MaxCapacity = "15140" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\TileWallpaper = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\LastEnum = 30002c007b00650066006200360030006200650034002d0039006100300034002d0031003100650062002d0062006500300033002d003800300036006500360066003600650036003900360033007d0000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Empty = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{efb60be4-9a04-11eb-be03-806e6f6e6963}\NukeOnDelete = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} svchost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1968 d96950d14352749542917183d25c38234c7ab5249062d913ff88516077eadbab.sample.exe 880 exusltb.exe 880 exusltb.exe 880 exusltb.exe 880 exusltb.exe 880 exusltb.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 880 exusltb.exe Token: SeDebugPrivilege 880 exusltb.exe Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: 33 1256 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1256 AUDIODG.EXE Token: 33 1256 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1256 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 1992 exusltb.exe 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 1992 exusltb.exe 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 916 d96950d14352749542917183d25c38234c7ab5249062d913ff88516077eadbab.sample.exe 1200 exusltb.exe 1092 exusltb.exe 1992 exusltb.exe 1992 exusltb.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 916 wrote to memory of 1968 916 d96950d14352749542917183d25c38234c7ab5249062d913ff88516077eadbab.sample.exe 27 PID 916 wrote to memory of 1968 916 d96950d14352749542917183d25c38234c7ab5249062d913ff88516077eadbab.sample.exe 27 PID 916 wrote to memory of 1968 916 d96950d14352749542917183d25c38234c7ab5249062d913ff88516077eadbab.sample.exe 27 PID 916 wrote to memory of 1968 916 d96950d14352749542917183d25c38234c7ab5249062d913ff88516077eadbab.sample.exe 27 PID 916 wrote to memory of 1968 916 d96950d14352749542917183d25c38234c7ab5249062d913ff88516077eadbab.sample.exe 27 PID 916 wrote to memory of 1968 916 d96950d14352749542917183d25c38234c7ab5249062d913ff88516077eadbab.sample.exe 27 PID 916 wrote to memory of 1968 916 d96950d14352749542917183d25c38234c7ab5249062d913ff88516077eadbab.sample.exe 27 PID 1736 wrote to memory of 1200 1736 taskeng.exe 30 PID 1736 wrote to memory of 1200 1736 taskeng.exe 30 PID 1736 wrote to memory of 1200 1736 taskeng.exe 30 PID 1736 wrote to memory of 1200 1736 taskeng.exe 30 PID 1200 wrote to memory of 880 1200 exusltb.exe 32 PID 1200 wrote to memory of 880 1200 exusltb.exe 32 PID 1200 wrote to memory of 880 1200 exusltb.exe 32 PID 1200 wrote to memory of 880 1200 exusltb.exe 32 PID 1200 wrote to memory of 880 1200 exusltb.exe 32 PID 1200 wrote to memory of 880 1200 exusltb.exe 32 PID 1200 wrote to memory of 880 1200 exusltb.exe 32 PID 880 wrote to memory of 580 880 exusltb.exe 24 PID 580 wrote to memory of 1832 580 svchost.exe 33 PID 580 wrote to memory of 1832 580 svchost.exe 33 PID 580 wrote to memory of 1832 580 svchost.exe 33 PID 880 wrote to memory of 1208 880 exusltb.exe 12 PID 880 wrote to memory of 544 880 exusltb.exe 34 PID 880 wrote to memory of 544 880 exusltb.exe 34 PID 880 wrote to memory of 544 880 exusltb.exe 34 PID 880 wrote to memory of 544 880 exusltb.exe 34 PID 880 wrote to memory of 1092 880 exusltb.exe 36 PID 880 wrote to memory of 1092 880 exusltb.exe 36 PID 880 wrote to memory of 1092 880 exusltb.exe 36 PID 880 wrote to memory of 1092 880 exusltb.exe 36 PID 1092 wrote to memory of 1992 1092 exusltb.exe 37 PID 1092 wrote to memory of 1992 1092 exusltb.exe 37 PID 1092 wrote to memory of 1992 1092 exusltb.exe 37 PID 1092 wrote to memory of 1992 1092 exusltb.exe 37 PID 1092 wrote to memory of 1992 1092 exusltb.exe 37 PID 1092 wrote to memory of 1992 1092 exusltb.exe 37 PID 1092 wrote to memory of 1992 1092 exusltb.exe 37 PID 580 wrote to memory of 908 580 svchost.exe 38 PID 580 wrote to memory of 908 580 svchost.exe 38 PID 580 wrote to memory of 908 580 svchost.exe 38
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Sets desktop wallpaper using registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\d96950d14352749542917183d25c38234c7ab5249062d913ff88516077eadbab.sample.exe"C:\Users\Admin\AppData\Local\Temp\d96950d14352749542917183d25c38234c7ab5249062d913ff88516077eadbab.sample.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\d96950d14352749542917183d25c38234c7ab5249062d913ff88516077eadbab.sample.exe"C:\Users\Admin\AppData\Local\Temp\d96950d14352749542917183d25c38234c7ab5249062d913ff88516077eadbab.sample.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:1832
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:908
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {22159274-32D0-4A17-A3DC-C027D2527EA7} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\exusltb.exeC:\Users\Admin\AppData\Local\Temp\exusltb.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\exusltb.exe"C:\Users\Admin\AppData\Local\Temp\exusltb.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows all4⤵
- Interacts with shadow copies
PID:544
-
-
C:\Users\Admin\AppData\Local\Temp\exusltb.exe"C:\Users\Admin\AppData\Local\Temp\exusltb.exe" -u4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\exusltb.exe"C:\Users\Admin\AppData\Local\Temp\exusltb.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1992
-
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2281⤵
- Suspicious use of AdjustPrivilegeToken
PID:1256