Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03/06/2022, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
ransomito.exe
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ransomito.exe
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
ransomito.exe
-
Size
2.1MB
-
MD5
f48a1057059028a65f2ec37e90d4deec
-
SHA1
ca8c5636aa98948c3b25153188b98967cc65a42b
-
SHA256
efb0f928648e6988c29bb03bb6b14f2760870f3040f0195ca1c6ad8ac5fa2dee
-
SHA512
57d62b07741effba928c92d39b5bd2dfc9c341b237ab1f83ba33e9cdba079a14bec1bbf63333b18f964e982bc510f615314f4426c258538e5be80f0a36c2b0a2
Score
8/10
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ransomito.exe -
Disables Task Manager via registry modification
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\CompareCopy.tiff ransomito.exe File renamed C:\Users\Admin\Pictures\CompareCopy.tiff => C:\Users\Admin\Pictures\CompareCopy.tiff.PAY2DECRYPTRLDwcYuR13f3VWL6crJ0rFV ransomito.exe File opened for modification C:\Users\Admin\Pictures\OpenAssert.tiff ransomito.exe File renamed C:\Users\Admin\Pictures\OpenAssert.tiff => C:\Users\Admin\Pictures\OpenAssert.tiff.PAY2DECRYPTRLDwcYuR13f3VWL6crJ0rFV ransomito.exe -
Drops desktop.ini file(s) 18 IoCs
description ioc Process File created C:\Users\Public\Documents\desktop.ini ransomito.exe File created C:\Users\Public\Recorded TV\desktop.ini ransomito.exe File created C:\Users\Public\Videos\desktop.ini ransomito.exe File created C:\Users\Public\Recorded TV\Sample Media\desktop.ini ransomito.exe File created C:\Users\Admin\Music\desktop.ini ransomito.exe File created C:\Users\Public\desktop.ini ransomito.exe File created C:\Users\Public\Downloads\desktop.ini ransomito.exe File created C:\Users\Public\Pictures\Sample Pictures\desktop.ini ransomito.exe File created C:\Users\Public\Videos\Sample Videos\desktop.ini ransomito.exe File created C:\Users\Admin\Desktop\desktop.ini ransomito.exe File created C:\Users\Admin\Downloads\desktop.ini ransomito.exe File created C:\Users\Public\Desktop\desktop.ini ransomito.exe File created C:\Users\Public\Libraries\desktop.ini ransomito.exe File created C:\Users\Public\Pictures\desktop.ini ransomito.exe File created C:\Users\Admin\Documents\desktop.ini ransomito.exe File created C:\Users\Admin\Pictures\desktop.ini ransomito.exe File created C:\Users\Public\Music\desktop.ini ransomito.exe File created C:\Users\Public\Music\Sample Music\desktop.ini ransomito.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs