Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    100s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    01/02/2022, 13:40

General

  • Target

    661c3cf835253ff1ab43ecf3ba70ee718d800e791b0158935016aa22c0e7eb0d.exe

  • Size

    1.2MB

  • MD5

    37af7a672cde1b63aaf577f2e7f9794f

  • SHA1

    5ad0add2e99f94f348b9b40c40bfec64bb132231

  • SHA256

    661c3cf835253ff1ab43ecf3ba70ee718d800e791b0158935016aa22c0e7eb0d

  • SHA512

    65b2a0949c59f0b00bef1cc74c14dee2317da39bf0a4ba4e5edfd223284b4a65c901220b7e405c22e09e6e8b3620c670c8587b681e533e36a5c8611cdba3244e

Malware Config

Extracted

Path

C:\Users\Public\Desktop\README_LOCKED.txt

Ransom Note
Greetings! There was a significant flaw in the security system of your company. You should be thankful that the flaw was exploited by serious people and not some rookies. They would have damaged all of your data by mistake or for fun. Your files are encrypted with the strongest military algorithms RSA4096 and AES-256. Without our special decoder it is impossible to restore the data. Attempts to restore your data with third party software as Photorec, RannohDecryptor etc. will lead to irreversible destruction of your data. To confirm our honest intentions. Send us 2-3 different random files and you will get them decrypted. It can be from different computers on your network to be sure that our decoder decrypts everything. Sample files we unlock for free (files should not be related to any kind of backups). We exclusively have decryption software for your situation DO NOT RESET OR SHUTDOWN - files may be damaged. DO NOT RENAME the encrypted files. DO NOT MOVE the encrypted files. This may lead to the impossibility of recovery of the certain files. The payment has to be made in Bitcoins. The final price depends on how fast you contact us. As soon as we receive the payment you will get the decryption tool and instructions on how to improve your systems security To get information on the price of the decoder contact us at: [email protected] [email protected]

Signatures

  • LockerGoga

    LockerGoga is a ransomware that is primarily used in targeted, disruptive attacks.

  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\661c3cf835253ff1ab43ecf3ba70ee718d800e791b0158935016aa22c0e7eb0d.exe
    "C:\Users\Admin\AppData\Local\Temp\661c3cf835253ff1ab43ecf3ba70ee718d800e791b0158935016aa22c0e7eb0d.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3820
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c move /y C:\Users\Admin\AppData\Local\Temp\661c3cf835253ff1ab43ecf3ba70ee718d800e791b0158935016aa22c0e7eb0d.exe C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
      2⤵
      • Suspicious behavior: RenamesItself
      PID:3288
    • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
      C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -m
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2320
      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
        3⤵
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2480
      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
        3⤵
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:564
      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
        3⤵
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3492
      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2496
      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
        3⤵
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:772
      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
        3⤵
        • Drops file in Program Files directory
        • Suspicious use of AdjustPrivilegeToken
        PID:3356
      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
        3⤵
        • Drops file in Program Files directory
        • Suspicious use of AdjustPrivilegeToken
        PID:4024
      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
        3⤵
        • Drops file in Program Files directory
        • Suspicious use of AdjustPrivilegeToken
        PID:3036
      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
        3⤵
        • Drops file in Program Files directory
        • Suspicious use of AdjustPrivilegeToken
        PID:2792
      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
        3⤵
        • Drops file in Program Files directory
        • Suspicious use of AdjustPrivilegeToken
        PID:2172
      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
        3⤵
        • Drops file in Program Files directory
        • Suspicious use of AdjustPrivilegeToken
        PID:944
      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
        3⤵
        • Drops file in Program Files directory
        PID:1344
      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
        3⤵
        • Drops file in Program Files directory
        PID:1232
      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
        3⤵
        • Drops file in Program Files directory
        PID:1856
      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
        3⤵
        • Drops file in Program Files directory
        PID:2688
      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
        3⤵
        • Drops file in Program Files directory
        PID:1396
      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
        3⤵
        • Drops file in Program Files directory
        PID:3148
      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
        3⤵
        • Drops file in Program Files directory
        PID:3112
      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
        3⤵
        • Drops file in Program Files directory
        PID:3852
      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
        3⤵
          PID:3648
        • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
          C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
          3⤵
            PID:3268
          • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
            C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
            3⤵
            • Drops file in Program Files directory
            PID:2964
          • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
            C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
            3⤵
            • Drops file in Program Files directory
            PID:3248
          • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
            C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
            3⤵
            • Drops file in Program Files directory
            PID:1908
          • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
            C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
            3⤵
            • Drops file in Program Files directory
            PID:3764
          • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
            C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
            3⤵
            • Drops file in Program Files directory
            PID:1328
          • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
            C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
            3⤵
            • Drops file in Program Files directory
            PID:3768
          • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
            C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
            3⤵
            • Drops file in Program Files directory
            PID:2220
          • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
            C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
            3⤵
            • Drops file in Program Files directory
            PID:1816
          • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
            C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
            3⤵
              PID:1464
            • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
              C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
              3⤵
                PID:1516
              • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                3⤵
                  PID:1852
                • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                  C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                  3⤵
                    PID:2648
                  • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                    C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                    3⤵
                      PID:2576
                    • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                      C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                      3⤵
                        PID:3244
                      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                        3⤵
                          PID:564
                        • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                          C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                          3⤵
                            PID:3548
                          • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                            C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                            3⤵
                              PID:1596
                            • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                              C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                              3⤵
                                PID:2544
                              • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                3⤵
                                  PID:3216
                                • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                  C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                  3⤵
                                    PID:3044
                                  • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                    C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                    3⤵
                                      PID:2208
                                    • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                      C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                      3⤵
                                        PID:788
                                      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                        3⤵
                                          PID:1808
                                        • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                          C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                          3⤵
                                            PID:2996
                                          • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                            C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                            3⤵
                                              PID:2440
                                            • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                              C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                              3⤵
                                                PID:2012
                                              • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                                C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                                3⤵
                                                  PID:2496
                                                • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                                  C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                                  3⤵
                                                    PID:2172
                                                  • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                                    C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                                    3⤵
                                                      PID:1512
                                                    • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                                      C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                                      3⤵
                                                        PID:1484
                                                      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                                        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                                        3⤵
                                                          PID:1176
                                                        • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                                          C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                                          3⤵
                                                            PID:2180
                                                          • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                                            C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                                            3⤵
                                                              PID:2628
                                                            • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                                              C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                                              3⤵
                                                                PID:1828
                                                              • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                                                C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                                                3⤵
                                                                  PID:988
                                                                • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                                                  3⤵
                                                                    PID:3024
                                                                  • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                                                    3⤵
                                                                      PID:2136
                                                                    • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                                                      3⤵
                                                                        PID:2892
                                                                      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                                                        3⤵
                                                                          PID:2236
                                                                        • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                                                          3⤵
                                                                            PID:3884
                                                                          • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                                                            3⤵
                                                                              PID:3980
                                                                            • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                                                              3⤵
                                                                                PID:3228
                                                                              • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                                                                3⤵
                                                                                  PID:2196
                                                                                • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                                                                  3⤵
                                                                                    PID:1340
                                                                                  • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                                                                    3⤵
                                                                                      PID:1220
                                                                                    • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                                                                      3⤵
                                                                                        PID:840
                                                                                      • C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\yxugwjud4051.exe -i Global\SM-yxugwjud -s
                                                                                        3⤵
                                                                                          PID:1016
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k wusvcs -p
                                                                                      1⤵
                                                                                        PID:344
                                                                                      • C:\Windows\system32\MusNotifyIcon.exe
                                                                                        %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
                                                                                        1⤵
                                                                                        • Checks processor information in registry
                                                                                        PID:792
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k wusvcs -p
                                                                                        1⤵
                                                                                          PID:2968
                                                                                        • C:\Windows\system32\WerFault.exe
                                                                                          C:\Windows\system32\WerFault.exe -pss -s 432 -p 2444 -ip 2444
                                                                                          1⤵
                                                                                            PID:1128
                                                                                          • C:\Windows\system32\WerFault.exe
                                                                                            C:\Windows\system32\WerFault.exe -u -p 2444 -s 5804
                                                                                            1⤵
                                                                                            • Program crash
                                                                                            PID:3548

                                                                                          Network

                                                                                          MITRE ATT&CK Enterprise v6

                                                                                          Replay Monitor

                                                                                          Loading Replay Monitor...

                                                                                          Downloads