Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
160s -
max time network
120s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
31/01/2022, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
aaf1c2e67e9049fcbfd9f97302d78837769e1ad20fb2c4f35c69339e95845938.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
aaf1c2e67e9049fcbfd9f97302d78837769e1ad20fb2c4f35c69339e95845938.exe
Resource
win10-en-20211208
General
-
Target
aaf1c2e67e9049fcbfd9f97302d78837769e1ad20fb2c4f35c69339e95845938.exe
-
Size
994KB
-
MD5
0cefce0dbbbedc5eb1febe4d85b23c71
-
SHA1
6aef7d5a462268c438c8417ee0da3f130b8aa84a
-
SHA256
aaf1c2e67e9049fcbfd9f97302d78837769e1ad20fb2c4f35c69339e95845938
-
SHA512
1311cf0b918419c192b3914a01e467430f445aaf6a003338e2176b1527c74263f658d8d39bd6d9c78b70324615101026767034798945d42d25215ee4d45654bf
Malware Config
Extracted
C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-uqvplrh.txt
http://onja764ig6vah2jo.onion.cab
http://onja764ig6vah2jo.tor2web.org
http://onja764ig6vah2jo.onion/
Signatures
-
CTB-Locker
Ransomware family which uses Tor to hide its C2 communications.
-
Executes dropped EXE 2 IoCs
pid Process 1820 wckayle.exe 684 wckayle.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Windows\Temp\laaaaaaa.tmp => C:\Users\Admin\Pictures\MountGrant.RAW.uqvplrh svchost.exe File renamed C:\Windows\Temp\laaaaaaa.tmp => C:\Users\Admin\Pictures\PushUnregister.RAW.uqvplrh svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 1820 wckayle.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1688 set thread context of 760 1688 aaf1c2e67e9049fcbfd9f97302d78837769e1ad20fb2c4f35c69339e95845938.exe 27 PID 1820 set thread context of 684 1820 wckayle.exe 30 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-uqvplrh.txt svchost.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-uqvplrh.bmp svchost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 760 aaf1c2e67e9049fcbfd9f97302d78837769e1ad20fb2c4f35c69339e95845938.exe 684 wckayle.exe 684 wckayle.exe 684 wckayle.exe 684 wckayle.exe 684 wckayle.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 684 wckayle.exe Token: SeDebugPrivilege 684 wckayle.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1688 wrote to memory of 760 1688 aaf1c2e67e9049fcbfd9f97302d78837769e1ad20fb2c4f35c69339e95845938.exe 27 PID 1688 wrote to memory of 760 1688 aaf1c2e67e9049fcbfd9f97302d78837769e1ad20fb2c4f35c69339e95845938.exe 27 PID 1688 wrote to memory of 760 1688 aaf1c2e67e9049fcbfd9f97302d78837769e1ad20fb2c4f35c69339e95845938.exe 27 PID 1688 wrote to memory of 760 1688 aaf1c2e67e9049fcbfd9f97302d78837769e1ad20fb2c4f35c69339e95845938.exe 27 PID 1688 wrote to memory of 760 1688 aaf1c2e67e9049fcbfd9f97302d78837769e1ad20fb2c4f35c69339e95845938.exe 27 PID 1688 wrote to memory of 760 1688 aaf1c2e67e9049fcbfd9f97302d78837769e1ad20fb2c4f35c69339e95845938.exe 27 PID 1688 wrote to memory of 760 1688 aaf1c2e67e9049fcbfd9f97302d78837769e1ad20fb2c4f35c69339e95845938.exe 27 PID 1688 wrote to memory of 760 1688 aaf1c2e67e9049fcbfd9f97302d78837769e1ad20fb2c4f35c69339e95845938.exe 27 PID 1240 wrote to memory of 1820 1240 taskeng.exe 29 PID 1240 wrote to memory of 1820 1240 taskeng.exe 29 PID 1240 wrote to memory of 1820 1240 taskeng.exe 29 PID 1240 wrote to memory of 1820 1240 taskeng.exe 29 PID 1820 wrote to memory of 684 1820 wckayle.exe 30 PID 1820 wrote to memory of 684 1820 wckayle.exe 30 PID 1820 wrote to memory of 684 1820 wckayle.exe 30 PID 1820 wrote to memory of 684 1820 wckayle.exe 30 PID 1820 wrote to memory of 684 1820 wckayle.exe 30 PID 1820 wrote to memory of 684 1820 wckayle.exe 30 PID 1820 wrote to memory of 684 1820 wckayle.exe 30 PID 1820 wrote to memory of 684 1820 wckayle.exe 30 PID 684 wrote to memory of 576 684 wckayle.exe 25 PID 576 wrote to memory of 1308 576 svchost.exe 32 PID 576 wrote to memory of 1308 576 svchost.exe 32 PID 576 wrote to memory of 1308 576 svchost.exe 32 PID 576 wrote to memory of 1768 576 svchost.exe 33 PID 576 wrote to memory of 1768 576 svchost.exe 33 PID 576 wrote to memory of 1768 576 svchost.exe 33 PID 684 wrote to memory of 1412 684 wckayle.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\aaf1c2e67e9049fcbfd9f97302d78837769e1ad20fb2c4f35c69339e95845938.exe"C:\Users\Admin\AppData\Local\Temp\aaf1c2e67e9049fcbfd9f97302d78837769e1ad20fb2c4f35c69339e95845938.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\aaf1c2e67e9049fcbfd9f97302d78837769e1ad20fb2c4f35c69339e95845938.exe"C:\Users\Admin\AppData\Local\Temp\aaf1c2e67e9049fcbfd9f97302d78837769e1ad20fb2c4f35c69339e95845938.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:760
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1412
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵
- Modifies extensions of user files
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding2⤵PID:1308
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:1768
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7D3B04BE-9000-4BD4-8EB3-DB1D8422DF6A} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\wckayle.exeC:\Users\Admin\AppData\Local\Temp\wckayle.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\wckayle.exeC:\Users\Admin\AppData\Local\Temp\wckayle.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:684
-
-