Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
218s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28/11/2022, 18:01
Static task
static1
Behavioral task
behavioral1
Sample
2419cf3833207c8e84a162a7ae0094982e8120cb0c242982ed848034998b4e72.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2419cf3833207c8e84a162a7ae0094982e8120cb0c242982ed848034998b4e72.exe
Resource
win10v2004-20220812-en
General
-
Target
2419cf3833207c8e84a162a7ae0094982e8120cb0c242982ed848034998b4e72.exe
-
Size
692KB
-
MD5
eef1051839abf0ad0cbe49488617672f
-
SHA1
d8d42dc918225d20b3388a056fe503f4d5524074
-
SHA256
2419cf3833207c8e84a162a7ae0094982e8120cb0c242982ed848034998b4e72
-
SHA512
a7eedc50cfa5bba76ffc7ce41f14b32687080b8842e94de949ff6288bedafc4a57f0f386f984e3dcf7191290879677d28c17e0652f0e14adf6a43b1e78efb9db
-
SSDEEP
12288:VQiHYh6UeeLrQp0/XoU8bTRsdi9JSZPLGhX9H1QO7l4n2A1muOhsXL:dQ6UeeLkMB8bTRskSjeXh+Ok7OhY
Malware Config
Extracted
C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-eobbgfm.txt
http://kph3onblkthy4z37.onion.cab
http://kph3onblkthy4z37.tor2web.org
http://kph3onblkthy4z37.onion/
Signatures
-
CTB-Locker
Ransomware family which uses Tor to hide its C2 communications.
-
Executes dropped EXE 2 IoCs
pid Process 1076 pojdjsb.exe 1780 pojdjsb.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 892 set thread context of 336 892 2419cf3833207c8e84a162a7ae0094982e8120cb0c242982ed848034998b4e72.exe 28 PID 1076 set thread context of 1780 1076 pojdjsb.exe 31 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-eobbgfm.txt svchost.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-eobbgfm.bmp svchost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 336 2419cf3833207c8e84a162a7ae0094982e8120cb0c242982ed848034998b4e72.exe 1780 pojdjsb.exe 1780 pojdjsb.exe 1780 pojdjsb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1780 pojdjsb.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 892 wrote to memory of 336 892 2419cf3833207c8e84a162a7ae0094982e8120cb0c242982ed848034998b4e72.exe 28 PID 892 wrote to memory of 336 892 2419cf3833207c8e84a162a7ae0094982e8120cb0c242982ed848034998b4e72.exe 28 PID 892 wrote to memory of 336 892 2419cf3833207c8e84a162a7ae0094982e8120cb0c242982ed848034998b4e72.exe 28 PID 892 wrote to memory of 336 892 2419cf3833207c8e84a162a7ae0094982e8120cb0c242982ed848034998b4e72.exe 28 PID 892 wrote to memory of 336 892 2419cf3833207c8e84a162a7ae0094982e8120cb0c242982ed848034998b4e72.exe 28 PID 892 wrote to memory of 336 892 2419cf3833207c8e84a162a7ae0094982e8120cb0c242982ed848034998b4e72.exe 28 PID 892 wrote to memory of 336 892 2419cf3833207c8e84a162a7ae0094982e8120cb0c242982ed848034998b4e72.exe 28 PID 1660 wrote to memory of 1076 1660 taskeng.exe 30 PID 1660 wrote to memory of 1076 1660 taskeng.exe 30 PID 1660 wrote to memory of 1076 1660 taskeng.exe 30 PID 1660 wrote to memory of 1076 1660 taskeng.exe 30 PID 1076 wrote to memory of 1780 1076 pojdjsb.exe 31 PID 1076 wrote to memory of 1780 1076 pojdjsb.exe 31 PID 1076 wrote to memory of 1780 1076 pojdjsb.exe 31 PID 1076 wrote to memory of 1780 1076 pojdjsb.exe 31 PID 1076 wrote to memory of 1780 1076 pojdjsb.exe 31 PID 1076 wrote to memory of 1780 1076 pojdjsb.exe 31 PID 1076 wrote to memory of 1780 1076 pojdjsb.exe 31 PID 1780 wrote to memory of 600 1780 pojdjsb.exe 26
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵
- Drops file in Program Files directory
PID:600
-
C:\Users\Admin\AppData\Local\Temp\2419cf3833207c8e84a162a7ae0094982e8120cb0c242982ed848034998b4e72.exe"C:\Users\Admin\AppData\Local\Temp\2419cf3833207c8e84a162a7ae0094982e8120cb0c242982ed848034998b4e72.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Local\Temp\2419cf3833207c8e84a162a7ae0094982e8120cb0c242982ed848034998b4e72.exe"C:\Users\Admin\AppData\Local\Temp\2419cf3833207c8e84a162a7ae0094982e8120cb0c242982ed848034998b4e72.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:336
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {EEB6C6CD-2FBC-45AA-AC6E-4B26806A3B35} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\pojdjsb.exeC:\Users\Admin\AppData\Local\Temp\pojdjsb.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\pojdjsb.exe"C:\Users\Admin\AppData\Local\Temp\pojdjsb.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1780
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD528da8b630b86c543a879f0fcdd1ce547
SHA12927abf63f194eafd85968663951d87a7996b675
SHA256ec6f6e40f60d24e072bc34f9ba4448b8765d1c05135a1245f677c428fb6f5b92
SHA5123de782c76ecd4ace188651c2884e3534624eb5e11f115e6e69db4ba9bf5f48b1046cbff46ca6e70d030bba0fced957d786ca2e4bf115b1cbc15e7f2cca154d88
-
Filesize
654B
MD5dee5267149404ed8c305f27c5977fc91
SHA1227d75c6168f4e1c263f671aeeca2ca8b2027dab
SHA256d6c0e29c6ccd48598e09784b7c926d9b7decaa12cac864c993d6b9745ba749b2
SHA512f5663eac53a6e66f98e8b17786dc08c423ad959fd80970490214d253d0a3d26d317117cd03640123c36a9fad7b2dfacfe4db16fa42c57985a0d047cabba9115d
-
Filesize
692KB
MD5eef1051839abf0ad0cbe49488617672f
SHA1d8d42dc918225d20b3388a056fe503f4d5524074
SHA2562419cf3833207c8e84a162a7ae0094982e8120cb0c242982ed848034998b4e72
SHA512a7eedc50cfa5bba76ffc7ce41f14b32687080b8842e94de949ff6288bedafc4a57f0f386f984e3dcf7191290879677d28c17e0652f0e14adf6a43b1e78efb9db
-
Filesize
692KB
MD5eef1051839abf0ad0cbe49488617672f
SHA1d8d42dc918225d20b3388a056fe503f4d5524074
SHA2562419cf3833207c8e84a162a7ae0094982e8120cb0c242982ed848034998b4e72
SHA512a7eedc50cfa5bba76ffc7ce41f14b32687080b8842e94de949ff6288bedafc4a57f0f386f984e3dcf7191290879677d28c17e0652f0e14adf6a43b1e78efb9db
-
Filesize
692KB
MD5eef1051839abf0ad0cbe49488617672f
SHA1d8d42dc918225d20b3388a056fe503f4d5524074
SHA2562419cf3833207c8e84a162a7ae0094982e8120cb0c242982ed848034998b4e72
SHA512a7eedc50cfa5bba76ffc7ce41f14b32687080b8842e94de949ff6288bedafc4a57f0f386f984e3dcf7191290879677d28c17e0652f0e14adf6a43b1e78efb9db