Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    124s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/12/2022, 17:48

General

  • Target

    91bd5168b9b0026bfcc02f4a30c11f76d8663ef3ccf734afcc490098b517fa25.exe

  • Size

    71KB

  • MD5

    b3f5d8a881bf8c1c0431cb6b9747918f

  • SHA1

    7c2b61a227133ce76c2b2fa95945c82647cfb5fc

  • SHA256

    91bd5168b9b0026bfcc02f4a30c11f76d8663ef3ccf734afcc490098b517fa25

  • SHA512

    1872ab6ecf9fd7035472a51f4eba681e26674532d0a86604bdee8c77c33234426aaf90b02c572572c412482f19f81388f2110787bb2fa04b04be08308a54e15b

  • SSDEEP

    768:HnI8FVk+TrPonxlCpMZTJcNGsryeqpNaO4izP2UCXkwdbA/aNtGBVsKB/sQ7cF9R:oo+6PikSZl7e6rW0wdbAyNcQDmnZS

Score
10/10

Malware Config

Extracted

Path

C:\odt\How To Restore Your Files.txt

Ransom Note
----------- [ Hello! ] -------------> ****BY DATAF L**OCKER**** What happend? ---------------------------------------------- Your computers and servers are encrypted, backups are deleted from your network and copied. We use strong encryption algorithms, so you cannot decrypt your data. But you can restore everything by purchasing a special program from us - a universal decoder. This program will restore your entire network. Follow our instructions below and you will recover all your data. If you continue to ignore this for a long time, we will start reporting the hack to mainstream media and posting your data to the dark web. What guarantees? ---------------------------------------------- We value our reputation. If we do not do our work and liabilities, nobody will pay us. This is not in our interests. All our decryption software is perfectly tested and will decrypt your data. We will also provide support in case of problems. We guarantee to decrypt one file for free. Go to the site and contact us. How to contact us? ---------------------------------------------- Using TOR Browser ( https://www.torproject.org/download/ ): tor chat: http://453aluxcu5vgxm4nqqui4ubbzoa5menbb4dyw3nc2rceqqgy7ms5grid.onion/hZwKUVTZ644VCbE3-19k login: User_3hfMgnKTFyQ_Vg== Password: QeimbBce7G8OBEh0pXkUCnyjPrM= ---------------------------------------------- !!! DANGER !!! DO NOT MODIFY or try to RECOVER any files yourself. We WILL NOT be able to RESTORE them. !!! DANGER !!
URLs

http://453aluxcu5vgxm4nqqui4ubbzoa5menbb4dyw3nc2rceqqgy7ms5grid.onion/hZwKUVTZ644VCbE3-19k

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\91bd5168b9b0026bfcc02f4a30c11f76d8663ef3ccf734afcc490098b517fa25.exe
    "C:\Users\Admin\AppData\Local\Temp\91bd5168b9b0026bfcc02f4a30c11f76d8663ef3ccf734afcc490098b517fa25.exe"
    1⤵
    • Modifies extensions of user files
    • Checks computer location settings
    • Drops startup file
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2428
      • C:\Windows\system32\vssadmin.exe
        vssadmin.exe delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:3624
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1056
      • C:\Windows\system32\vssadmin.exe
        vssadmin.exe delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:4948
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1280

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads