Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
48s -
max time network
70s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
01/01/2022, 14:57
Static task
static1
Behavioral task
behavioral1
Sample
config.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
config.exe
Resource
win10-en-20211208
General
-
Target
config.exe
-
Size
2.1MB
-
MD5
cf351819c69c94fbdaec24cb8c30990b
-
SHA1
4911d5384ca3720c48a0c8ba47b1edba33dfa0ff
-
SHA256
25d18c3823a3b210a18e69c823ce4c59fab298c315ac2a5d891027921d1c6d7e
-
SHA512
c6ed66e7a0afa76ff2c583b91e90ed8a193af8c25ba5e81e29be652bbbdfaf1fa62047826066f8ebc3677873e6a75237103ec4dc61544c3e5c11eff2b401c5b9
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 12 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\BlockStep.crw => C:\Users\Admin\Pictures\BlockStep.crw.xyz config.exe File renamed C:\Users\Admin\Pictures\ConvertConnect.png => C:\Users\Admin\Pictures\ConvertConnect.png.xyz config.exe File renamed C:\Users\Admin\Pictures\ConvertToSwitch.crw => C:\Users\Admin\Pictures\ConvertToSwitch.crw.xyz config.exe File renamed C:\Users\Admin\Pictures\ExportTest.tiff => C:\Users\Admin\Pictures\ExportTest.tiff.xyz config.exe File renamed C:\Users\Admin\Pictures\UndoConfirm.raw => C:\Users\Admin\Pictures\UndoConfirm.raw.xyz config.exe File renamed C:\Users\Admin\Pictures\PopInitialize.crw => C:\Users\Admin\Pictures\PopInitialize.crw.xyz config.exe File renamed C:\Users\Admin\Pictures\AddExport.crw => C:\Users\Admin\Pictures\AddExport.crw.xyz config.exe File renamed C:\Users\Admin\Pictures\DisconnectRepair.raw => C:\Users\Admin\Pictures\DisconnectRepair.raw.xyz config.exe File opened for modification C:\Users\Admin\Pictures\ExportTest.tiff config.exe File renamed C:\Users\Admin\Pictures\InstallUnblock.raw => C:\Users\Admin\Pictures\InstallUnblock.raw.xyz config.exe File renamed C:\Users\Admin\Pictures\MoveResume.tif => C:\Users\Admin\Pictures\MoveResume.tif.xyz config.exe File renamed C:\Users\Admin\Pictures\PopGrant.raw => C:\Users\Admin\Pictures\PopGrant.raw.xyz config.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 15 IoCs
description ioc Process File created C:\Users\Admin\Favorites\Links\desktop.ini config.exe File created C:\Users\Admin\Music\desktop.ini config.exe File created C:\Users\Admin\OneDrive\desktop.ini config.exe File created C:\Users\Admin\Pictures\Saved Pictures\desktop.ini config.exe File created C:\Users\Admin\Videos\desktop.ini config.exe File created C:\Users\Admin\Downloads\desktop.ini config.exe File created C:\Users\Admin\Desktop\desktop.ini config.exe File created C:\Users\Admin\Contacts\desktop.ini config.exe File created C:\Users\Admin\Favorites\desktop.ini config.exe File created C:\Users\Admin\Links\desktop.ini config.exe File created C:\Users\Admin\Saved Games\desktop.ini config.exe File created C:\Users\Admin\Searches\desktop.ini config.exe File created C:\Users\Admin\Documents\desktop.ini config.exe File created C:\Users\Admin\Pictures\desktop.ini config.exe File created C:\Users\Admin\Pictures\Camera Roll\desktop.ini config.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: cipher.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2016 vssadmin.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3804 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2064 powershell.exe 2064 powershell.exe 2064 powershell.exe 2652 powershell.exe 680 powershell.exe 2652 powershell.exe 680 powershell.exe 2652 powershell.exe 680 powershell.exe 2532 powershell.exe 2532 powershell.exe 2532 powershell.exe 3980 powershell.exe 3980 powershell.exe 3980 powershell.exe 748 powershell.exe 748 powershell.exe 748 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2680 wmic.exe Token: SeSecurityPrivilege 2680 wmic.exe Token: SeTakeOwnershipPrivilege 2680 wmic.exe Token: SeLoadDriverPrivilege 2680 wmic.exe Token: SeSystemProfilePrivilege 2680 wmic.exe Token: SeSystemtimePrivilege 2680 wmic.exe Token: SeProfSingleProcessPrivilege 2680 wmic.exe Token: SeIncBasePriorityPrivilege 2680 wmic.exe Token: SeCreatePagefilePrivilege 2680 wmic.exe Token: SeBackupPrivilege 2680 wmic.exe Token: SeRestorePrivilege 2680 wmic.exe Token: SeShutdownPrivilege 2680 wmic.exe Token: SeDebugPrivilege 2680 wmic.exe Token: SeSystemEnvironmentPrivilege 2680 wmic.exe Token: SeRemoteShutdownPrivilege 2680 wmic.exe Token: SeUndockPrivilege 2680 wmic.exe Token: SeManageVolumePrivilege 2680 wmic.exe Token: 33 2680 wmic.exe Token: 34 2680 wmic.exe Token: 35 2680 wmic.exe Token: 36 2680 wmic.exe Token: SeIncreaseQuotaPrivilege 2680 wmic.exe Token: SeSecurityPrivilege 2680 wmic.exe Token: SeTakeOwnershipPrivilege 2680 wmic.exe Token: SeLoadDriverPrivilege 2680 wmic.exe Token: SeSystemProfilePrivilege 2680 wmic.exe Token: SeSystemtimePrivilege 2680 wmic.exe Token: SeProfSingleProcessPrivilege 2680 wmic.exe Token: SeIncBasePriorityPrivilege 2680 wmic.exe Token: SeCreatePagefilePrivilege 2680 wmic.exe Token: SeBackupPrivilege 2680 wmic.exe Token: SeRestorePrivilege 2680 wmic.exe Token: SeShutdownPrivilege 2680 wmic.exe Token: SeDebugPrivilege 2680 wmic.exe Token: SeSystemEnvironmentPrivilege 2680 wmic.exe Token: SeRemoteShutdownPrivilege 2680 wmic.exe Token: SeUndockPrivilege 2680 wmic.exe Token: SeManageVolumePrivilege 2680 wmic.exe Token: 33 2680 wmic.exe Token: 34 2680 wmic.exe Token: 35 2680 wmic.exe Token: 36 2680 wmic.exe Token: SeIncreaseQuotaPrivilege 1036 wmic.exe Token: SeSecurityPrivilege 1036 wmic.exe Token: SeTakeOwnershipPrivilege 1036 wmic.exe Token: SeLoadDriverPrivilege 1036 wmic.exe Token: SeSystemProfilePrivilege 1036 wmic.exe Token: SeSystemtimePrivilege 1036 wmic.exe Token: SeProfSingleProcessPrivilege 1036 wmic.exe Token: SeIncBasePriorityPrivilege 1036 wmic.exe Token: SeCreatePagefilePrivilege 1036 wmic.exe Token: SeBackupPrivilege 1036 wmic.exe Token: SeRestorePrivilege 1036 wmic.exe Token: SeShutdownPrivilege 1036 wmic.exe Token: SeDebugPrivilege 1036 wmic.exe Token: SeSystemEnvironmentPrivilege 1036 wmic.exe Token: SeRemoteShutdownPrivilege 1036 wmic.exe Token: SeUndockPrivilege 1036 wmic.exe Token: SeManageVolumePrivilege 1036 wmic.exe Token: 33 1036 wmic.exe Token: 34 1036 wmic.exe Token: 35 1036 wmic.exe Token: 36 1036 wmic.exe Token: SeIncreaseQuotaPrivilege 1036 wmic.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3964 wrote to memory of 2680 3964 config.exe 70 PID 3964 wrote to memory of 2680 3964 config.exe 70 PID 3964 wrote to memory of 1036 3964 config.exe 72 PID 3964 wrote to memory of 1036 3964 config.exe 72 PID 3964 wrote to memory of 2064 3964 config.exe 73 PID 3964 wrote to memory of 2064 3964 config.exe 73 PID 2064 wrote to memory of 2652 2064 powershell.exe 75 PID 2064 wrote to memory of 2652 2064 powershell.exe 75 PID 3964 wrote to memory of 680 3964 config.exe 77 PID 3964 wrote to memory of 680 3964 config.exe 77 PID 2652 wrote to memory of 2016 2652 powershell.exe 78 PID 2652 wrote to memory of 2016 2652 powershell.exe 78 PID 680 wrote to memory of 2532 680 powershell.exe 79 PID 680 wrote to memory of 2532 680 powershell.exe 79 PID 3964 wrote to memory of 2208 3964 config.exe 82 PID 3964 wrote to memory of 2208 3964 config.exe 82 PID 3964 wrote to memory of 3980 3964 config.exe 84 PID 3964 wrote to memory of 3980 3964 config.exe 84 PID 2532 wrote to memory of 1532 2532 powershell.exe 85 PID 2532 wrote to memory of 1532 2532 powershell.exe 85 PID 3980 wrote to memory of 748 3980 powershell.exe 86 PID 3980 wrote to memory of 748 3980 powershell.exe 86 PID 748 wrote to memory of 1572 748 powershell.exe 88 PID 748 wrote to memory of 1572 748 powershell.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\config.exe"C:\Users\Admin\AppData\Local\Temp\config.exe"1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\System32\Wbem\wmic.exewmic MEMORYCHIP get Capacity2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\System32\Wbem\wmic.exewmic logicaldisk get name2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell start-process powershell -windowstyle hidden "{vssadmin delete shadows /all /quiet}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" vssadmin delete shadows /all /quiet3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:2016
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell start-process powershell -windowstyle hidden "{ cipher /w:C:\}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" cipher /w:C:\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\system32\cipher.exe"C:\Windows\system32\cipher.exe" /w:C:\4⤵PID:1532
-
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic logicaldisk get name2⤵PID:2208
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell start-process powershell -windowstyle hidden "{ cipher /w:D:\}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" cipher /w:D:\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\system32\cipher.exe"C:\Windows\system32\cipher.exe" /w:D:\4⤵
- Enumerates connected drives
PID:1572
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:800
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_Readme_.txt1⤵
- Opens file in notepad (likely ransom note)
PID:3804