Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
99s -
max time network
132s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
01/08/2021, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7v20210408
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v20210410
0 signatures
0 seconds
General
-
Target
sample.exe
-
Size
67KB
-
MD5
598c53bfef81e489375f09792e487f1a
-
SHA1
80a29bd2c349a8588edf42653ed739054f9a10f5
-
SHA256
22d7d67c3af10b1a37f277ebabe2d1eb4fd25afbd6437d4377400e148bcc08d6
-
SHA512
6a82ad5009588d2fa343bef8d9d2a02e2e76eec14979487a929a96a6b6965e82265a69ef8dd29a01927e9713468de3aedd7b5ee5e79839a1a50649855a160c35
Score
10/10
Malware Config
Extracted
Path
C:\1rWCqamCt.README.txt
Ransom Note
~+
* +
' BLACK |
() .-.,='``'=. - o -
'=/_ \ |
* | '=._ |
\ `=./`, '
. '=.__.=' `=' *
+ Matter +
O * ' .
>>> What happens?
Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver.
We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.
>>> What guarantees?
We are not a politically motivated group and we do not need anything other than your money.
If you pay, we will provide you the programs for decryption and we will delete your data.
If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals.
We always keep our promises.
>> Data leak includes
1. Full emloyeers personal data
2. Network information
3. Schemes of buildings, active project information, architect details and contracts,
4. Finance info
>>> How to contact with us?
1. Download and install TOR Browser (https://www.torproject.org/).
2. Open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/7NT6LXKC1XQHW5039BLOV.
>>> Warning! Recovery recommendations.
We strongly recommend you to do not MODIFY or REPAIR your files, that will damage them.
URLs
http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/7NT6LXKC1XQHW5039BLOV
Signatures
-
Modifies extensions of user files 21 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\SubmitConnect.crw => C:\Users\Admin\Pictures\SubmitConnect.crw.1rWCqamCt sample.exe File opened for modification C:\Users\Admin\Pictures\SubmitConnect.crw.1rWCqamCt sample.exe File opened for modification C:\Users\Admin\Pictures\ApproveUse.tiff.1rWCqamCt sample.exe File renamed C:\Users\Admin\Pictures\DenyCheckpoint.raw => C:\Users\Admin\Pictures\DenyCheckpoint.raw.1rWCqamCt sample.exe File opened for modification C:\Users\Admin\Pictures\DenyCheckpoint.raw.1rWCqamCt sample.exe File opened for modification C:\Users\Admin\Pictures\EditConvertTo.tiff sample.exe File opened for modification C:\Users\Admin\Pictures\EditConvertTo.tiff.1rWCqamCt sample.exe File opened for modification C:\Users\Admin\Pictures\ReadMount.png.1rWCqamCt sample.exe File renamed C:\Users\Admin\Pictures\ConvertFromFind.tif => C:\Users\Admin\Pictures\ConvertFromFind.tif.1rWCqamCt sample.exe File opened for modification C:\Users\Admin\Pictures\EnableRemove.raw.1rWCqamCt sample.exe File renamed C:\Users\Admin\Pictures\ReadMount.png => C:\Users\Admin\Pictures\ReadMount.png.1rWCqamCt sample.exe File opened for modification C:\Users\Admin\Pictures\ConvertFromFind.tif.1rWCqamCt sample.exe File renamed C:\Users\Admin\Pictures\EnableRemove.raw => C:\Users\Admin\Pictures\EnableRemove.raw.1rWCqamCt sample.exe File opened for modification C:\Users\Admin\Pictures\ReadSuspend.png.1rWCqamCt sample.exe File opened for modification C:\Users\Admin\Pictures\SkipAdd.tiff.1rWCqamCt sample.exe File opened for modification C:\Users\Admin\Pictures\ApproveUse.tiff sample.exe File renamed C:\Users\Admin\Pictures\ApproveUse.tiff => C:\Users\Admin\Pictures\ApproveUse.tiff.1rWCqamCt sample.exe File renamed C:\Users\Admin\Pictures\EditConvertTo.tiff => C:\Users\Admin\Pictures\EditConvertTo.tiff.1rWCqamCt sample.exe File renamed C:\Users\Admin\Pictures\ReadSuspend.png => C:\Users\Admin\Pictures\ReadSuspend.png.1rWCqamCt sample.exe File opened for modification C:\Users\Admin\Pictures\SkipAdd.tiff sample.exe File renamed C:\Users\Admin\Pictures\SkipAdd.tiff => C:\Users\Admin\Pictures\SkipAdd.tiff.1rWCqamCt sample.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\1rWCqamCt.bmp" sample.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\1rWCqamCt.bmp" sample.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 1828 sample.exe 1828 sample.exe 1828 sample.exe 1828 sample.exe 1828 sample.exe 1828 sample.exe -
Modifies Control Panel 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Control Panel\International sample.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Control Panel\Desktop sample.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Control Panel\Desktop\WallpaperStyle = "10" sample.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1828 sample.exe 1828 sample.exe 1828 sample.exe 1828 sample.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeBackupPrivilege 1828 sample.exe Token: SeDebugPrivilege 1828 sample.exe Token: 36 1828 sample.exe Token: SeImpersonatePrivilege 1828 sample.exe Token: SeIncBasePriorityPrivilege 1828 sample.exe Token: SeIncreaseQuotaPrivilege 1828 sample.exe Token: 33 1828 sample.exe Token: SeManageVolumePrivilege 1828 sample.exe Token: SeProfSingleProcessPrivilege 1828 sample.exe Token: SeRestorePrivilege 1828 sample.exe Token: SeSecurityPrivilege 1828 sample.exe Token: SeSystemProfilePrivilege 1828 sample.exe Token: SeTakeOwnershipPrivilege 1828 sample.exe Token: SeShutdownPrivilege 1828 sample.exe Token: SeBackupPrivilege 1624 vssvc.exe Token: SeRestorePrivilege 1624 vssvc.exe Token: SeAuditPrivilege 1624 vssvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Modifies extensions of user files
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1624