Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 16:22
Static task
static1
Behavioral task
behavioral1
Sample
b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe
Resource
win10v2004-20220901-en
General
-
Target
b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe
-
Size
815KB
-
MD5
51ed7e8e341c08280b7a0217f7c39a3f
-
SHA1
079ad2df4a1db02c4170b7d44aaa189f16194fa1
-
SHA256
b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a
-
SHA512
13c810699ca58e17a8a5e2bf36e3eeb5d404d5f740ae833fc06f3bcef3aa3cb01da6d373be07a32e29cc613c09803132b8b1a28928a2ffd35abc60b1918168be
-
SSDEEP
24576:coZle5i/xmrxgxh6UAkNe7bBmGC5MN8XL:dg9yG4Gen
Malware Config
Extracted
C:\Users\Admin\Documents\!Decrypt-All-Files-brkqcsi.txt
http://onja764ig6vah2jo.onion.cab
http://onja764ig6vah2jo.tor2web.org
http://onja764ig6vah2jo.onion/
Extracted
C:\ProgramData\yrnkowk.html
http://onja764ig6vah2jo.onion.cab
http://onja764ig6vah2jo.tor2web.org
http://onja764ig6vah2jo.onion
Signatures
-
CTB-Locker
Ransomware family which uses Tor to hide its C2 communications.
-
Executes dropped EXE 4 IoCs
pid Process 4860 dajjvan.exe 1192 dajjvan.exe 3876 dajjvan.exe 4840 dajjvan.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation dajjvan.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 dajjvan.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\desktop.ini dajjvan.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dajjvan.exe.log dajjvan.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 dajjvan.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE dajjvan.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies dajjvan.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Documents\\!Decrypt-All-Files-brkqcsi.bmp" Explorer.EXE -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1616 set thread context of 4812 1616 b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe 81 PID 4860 set thread context of 1192 4860 dajjvan.exe 83 PID 3876 set thread context of 4840 3876 dajjvan.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\GPU dajjvan.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"6.2.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" dajjvan.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch dajjvan.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" dajjvan.exe -
Modifies data under HKEY_USERS 20 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Full = "%SystemRoot%\\System32\\imageres.dll,-54" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2339e045-0000-0000-0000-d01200000000}\MaxCapacity = "15140" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\LastEnum = 30002c007b00320033003300390065003000340035002d0030003000300030002d0030003000300030002d0030003000300030002d006400300031003200300030003000300030003000300030007d0000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2339e045-0000-0000-0000-d01200000000} svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\TileWallpaper = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\ = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2339e045-0000-0000-0000-d01200000000}\NukeOnDelete = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Empty = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@%SystemRoot%\system32\shell32.dll,-50176 = "File Operation" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WallpaperStyle = "0" svchost.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4812 b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe 4812 b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe 1192 dajjvan.exe 1192 dajjvan.exe 1192 dajjvan.exe 1192 dajjvan.exe 1192 dajjvan.exe 1192 dajjvan.exe 1192 dajjvan.exe 1192 dajjvan.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2056 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1192 dajjvan.exe Token: SeDebugPrivilege 1192 dajjvan.exe Token: SeShutdownPrivilege 2056 Explorer.EXE Token: SeCreatePagefilePrivilege 2056 Explorer.EXE Token: SeShutdownPrivilege 2056 Explorer.EXE Token: SeCreatePagefilePrivilege 2056 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4840 dajjvan.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4840 dajjvan.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4840 dajjvan.exe 4840 dajjvan.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1616 wrote to memory of 4812 1616 b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe 81 PID 1616 wrote to memory of 4812 1616 b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe 81 PID 1616 wrote to memory of 4812 1616 b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe 81 PID 1616 wrote to memory of 4812 1616 b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe 81 PID 1616 wrote to memory of 4812 1616 b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe 81 PID 1616 wrote to memory of 4812 1616 b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe 81 PID 1616 wrote to memory of 4812 1616 b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe 81 PID 4860 wrote to memory of 1192 4860 dajjvan.exe 83 PID 4860 wrote to memory of 1192 4860 dajjvan.exe 83 PID 4860 wrote to memory of 1192 4860 dajjvan.exe 83 PID 4860 wrote to memory of 1192 4860 dajjvan.exe 83 PID 4860 wrote to memory of 1192 4860 dajjvan.exe 83 PID 4860 wrote to memory of 1192 4860 dajjvan.exe 83 PID 4860 wrote to memory of 1192 4860 dajjvan.exe 83 PID 1192 wrote to memory of 780 1192 dajjvan.exe 8 PID 780 wrote to memory of 2264 780 svchost.exe 89 PID 780 wrote to memory of 2264 780 svchost.exe 89 PID 780 wrote to memory of 3344 780 svchost.exe 91 PID 780 wrote to memory of 3344 780 svchost.exe 91 PID 1192 wrote to memory of 2056 1192 dajjvan.exe 53 PID 1192 wrote to memory of 3876 1192 dajjvan.exe 92 PID 1192 wrote to memory of 3876 1192 dajjvan.exe 92 PID 1192 wrote to memory of 3876 1192 dajjvan.exe 92 PID 3876 wrote to memory of 4840 3876 dajjvan.exe 93 PID 3876 wrote to memory of 4840 3876 dajjvan.exe 93 PID 3876 wrote to memory of 4840 3876 dajjvan.exe 93 PID 3876 wrote to memory of 4840 3876 dajjvan.exe 93 PID 3876 wrote to memory of 4840 3876 dajjvan.exe 93 PID 3876 wrote to memory of 4840 3876 dajjvan.exe 93 PID 3876 wrote to memory of 4840 3876 dajjvan.exe 93
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵
- Drops desktop.ini file(s)
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding2⤵PID:2264
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:3344
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Sets desktop wallpaper using registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe"C:\Users\Admin\AppData\Local\Temp\b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe"C:\Users\Admin\AppData\Local\Temp\b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
-
C:\Users\Admin\AppData\Local\Temp\dajjvan.exeC:\Users\Admin\AppData\Local\Temp\dajjvan.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\dajjvan.exeC:\Users\Admin\AppData\Local\Temp\dajjvan.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\dajjvan.exe"C:\Users\Admin\AppData\Local\Temp\dajjvan.exe" -u3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\dajjvan.exe"C:\Users\Admin\AppData\Local\Temp\dajjvan.exe" -u4⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4840
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD5438fbd458985c7da8eb501b3162cd7b5
SHA18f2e29b99c2930ac1db67ed67c607342a025f11b
SHA256a653a6ecf1a8f6b669cc430fc229795e992ebdbf751e42f43d4cb04450ddb610
SHA512862f476e56bd813b0605e0ad1b824d2c1b37d10a35acadf01fc7efb8f0b0d40d4a8af4e05874d51798ae6b10cd50bea1afd37ee8c147b3c695518face382e5cd
-
Filesize
654B
MD5438fbd458985c7da8eb501b3162cd7b5
SHA18f2e29b99c2930ac1db67ed67c607342a025f11b
SHA256a653a6ecf1a8f6b669cc430fc229795e992ebdbf751e42f43d4cb04450ddb610
SHA512862f476e56bd813b0605e0ad1b824d2c1b37d10a35acadf01fc7efb8f0b0d40d4a8af4e05874d51798ae6b10cd50bea1afd37ee8c147b3c695518face382e5cd
-
Filesize
654B
MD5cc4ed838fa7a46c34428632e6f168f6d
SHA1f248113f2836767e86f56a0d21e592b592c91df7
SHA25666b5fc436be5ce913c21f3e0c4d50332b6e721299929748bf175cd266b0d6a1d
SHA5127d2986606d738c23d76462837383b87f51b137aa59606b9f6d7a8b3c62a45c7a24ed1eb8d97fad6e2a6aca0c6a4e90401d7b606dc9ea1c7378418137435ed013
-
Filesize
654B
MD59900252d87369ad6c08696e01e383159
SHA1d875dc52da43ce5f31b84912d713da671bc7dda6
SHA256e67552b2fd42fae67d7de039c62d172e7411d219d7dc0b580c6b0b298b4ed43f
SHA512ebe20e92ca856b88781c6044c3c0650f18d9760a46d9c1a9e0a7cd6919fa3230b14f5e227e2c35d87cd7724e17aaccf06b0441e75201ae715fbd1f3281b27a03
-
Filesize
654B
MD59900252d87369ad6c08696e01e383159
SHA1d875dc52da43ce5f31b84912d713da671bc7dda6
SHA256e67552b2fd42fae67d7de039c62d172e7411d219d7dc0b580c6b0b298b4ed43f
SHA512ebe20e92ca856b88781c6044c3c0650f18d9760a46d9c1a9e0a7cd6919fa3230b14f5e227e2c35d87cd7724e17aaccf06b0441e75201ae715fbd1f3281b27a03
-
Filesize
225KB
MD5a3310c0288de46f755b3e07885327396
SHA108b2a92416fa452cf918211b3100023d07b88da4
SHA2565abde51ecb61a099a3209236f7c4ac505540cf4eb03cb7db20d2589aa2343cf4
SHA5123e48e4c3a36aa390871589fb983e58eac434e164cf930850d4a2b3184e55775f38d7a15e9de3217b40c47f5e99c7eb725367d7d3b5dd9f3fa7198b9f0cf45e28
-
Filesize
815KB
MD551ed7e8e341c08280b7a0217f7c39a3f
SHA1079ad2df4a1db02c4170b7d44aaa189f16194fa1
SHA256b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a
SHA51213c810699ca58e17a8a5e2bf36e3eeb5d404d5f740ae833fc06f3bcef3aa3cb01da6d373be07a32e29cc613c09803132b8b1a28928a2ffd35abc60b1918168be
-
Filesize
815KB
MD551ed7e8e341c08280b7a0217f7c39a3f
SHA1079ad2df4a1db02c4170b7d44aaa189f16194fa1
SHA256b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a
SHA51213c810699ca58e17a8a5e2bf36e3eeb5d404d5f740ae833fc06f3bcef3aa3cb01da6d373be07a32e29cc613c09803132b8b1a28928a2ffd35abc60b1918168be
-
Filesize
815KB
MD551ed7e8e341c08280b7a0217f7c39a3f
SHA1079ad2df4a1db02c4170b7d44aaa189f16194fa1
SHA256b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a
SHA51213c810699ca58e17a8a5e2bf36e3eeb5d404d5f740ae833fc06f3bcef3aa3cb01da6d373be07a32e29cc613c09803132b8b1a28928a2ffd35abc60b1918168be
-
Filesize
815KB
MD551ed7e8e341c08280b7a0217f7c39a3f
SHA1079ad2df4a1db02c4170b7d44aaa189f16194fa1
SHA256b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a
SHA51213c810699ca58e17a8a5e2bf36e3eeb5d404d5f740ae833fc06f3bcef3aa3cb01da6d373be07a32e29cc613c09803132b8b1a28928a2ffd35abc60b1918168be
-
Filesize
815KB
MD551ed7e8e341c08280b7a0217f7c39a3f
SHA1079ad2df4a1db02c4170b7d44aaa189f16194fa1
SHA256b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a
SHA51213c810699ca58e17a8a5e2bf36e3eeb5d404d5f740ae833fc06f3bcef3aa3cb01da6d373be07a32e29cc613c09803132b8b1a28928a2ffd35abc60b1918168be
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\CachedFiles\CachedImage_1280_720_POS4.JPG.brkqcsi
Filesize36KB
MD5365ddada87d4ccf9456141b0e0cc9756
SHA1623875fbbb4c42d3a68d4cd5cd41a3712614139a
SHA2564db0418c14ae7712a28d60f0a5cdf0286e1b5110e1d32ffdda24a2f499c385ab
SHA5128ba92268bed8691fc86ff1506af8d672f1fa04d4be5f6db589b9d68a6f717bd05e97b70c3724d0eeb9943c51f357590e13a45b953abcfcba96b17d2b99c82e67
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dajjvan.exe.log
Filesize397B
MD5ce4eda6d244da60119efce9ff9131f1d
SHA1534bbbf5eb3096d685a46562793497f404b316cc
SHA2569e49b79135cf5b7c732e862973bb5fb37ddd68a8c7f7cd4c45d70a2e8de54c41
SHA5123e9de662a7d015a6e6651d1b8b40ab67b0ac34b15a7e7842590cf81a64edbc9ae64daecd8ff45096fe751ea7cf4d1f847ba11bf87484c66938e8b81f40dd2e95