Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    46s
  • max time network
    48s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/06/2023, 19:48

General

  • Target

    NoMoreRansom.exe

  • Size

    1.4MB

  • MD5

    63210f8f1dde6c40a7f3643ccf0ff313

  • SHA1

    57edd72391d710d71bead504d44389d0462ccec9

  • SHA256

    2aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f

  • SHA512

    87a89e8ab85be150a783a9f8d41797cfa12f86fdccb48f2180c0498bfd2b1040b730dee4665fe2c83b98d436453680226051b7f1532e1c0e0cda0cf702e80a11

  • SSDEEP

    12288:WZgSKWk54jeg6lL5assQHtzV2KoLJ+PwXxwuLSJ8slf1zMr6iL/KNDx2PIXe2Q:KgoLetlLS8tz6V+PwD0XVMrXCNDxtK

Malware Config

Signatures

  • Troldesh, Shade, Encoder.858

    Troldesh is a ransomware spread by malspam.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NoMoreRansom.exe
    "C:\Users\Admin\AppData\Local\Temp\NoMoreRansom.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    PID:3920
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff8b9789758,0x7ff8b9789768,0x7ff8b9789778
      2⤵
        PID:4108
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1968 --field-trial-handle=1760,i,4427659376470970234,7989771283114004017,131072 /prefetch:8
        2⤵
          PID:2856
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1760,i,4427659376470970234,7989771283114004017,131072 /prefetch:2
          2⤵
            PID:2188
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1676 --field-trial-handle=1760,i,4427659376470970234,7989771283114004017,131072 /prefetch:8
            2⤵
              PID:1336
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2976 --field-trial-handle=1760,i,4427659376470970234,7989771283114004017,131072 /prefetch:1
              2⤵
                PID:3504
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1984 --field-trial-handle=1760,i,4427659376470970234,7989771283114004017,131072 /prefetch:1
                2⤵
                  PID:3688
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3940 --field-trial-handle=1760,i,4427659376470970234,7989771283114004017,131072 /prefetch:1
                  2⤵
                    PID:3392
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4420 --field-trial-handle=1760,i,4427659376470970234,7989771283114004017,131072 /prefetch:8
                    2⤵
                      PID:4972
                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe
                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level
                      2⤵
                        PID:4956
                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe
                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x24c,0x250,0x254,0x228,0x258,0x7ff6b8c77688,0x7ff6b8c77698,0x7ff6b8c776a8
                          3⤵
                            PID:4816
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4432 --field-trial-handle=1760,i,4427659376470970234,7989771283114004017,131072 /prefetch:8
                          2⤵
                            PID:3348
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4392 --field-trial-handle=1760,i,4427659376470970234,7989771283114004017,131072 /prefetch:1
                            2⤵
                              PID:508
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4604 --field-trial-handle=1760,i,4427659376470970234,7989771283114004017,131072 /prefetch:1
                              2⤵
                                PID:1552
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3952 --field-trial-handle=1760,i,4427659376470970234,7989771283114004017,131072 /prefetch:1
                                2⤵
                                  PID:748
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3024 --field-trial-handle=1760,i,4427659376470970234,7989771283114004017,131072 /prefetch:1
                                  2⤵
                                    PID:312
                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                  1⤵
                                    PID:4408

                                  Network

                                  MITRE ATT&CK Enterprise v6

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                    Filesize

                                    570B

                                    MD5

                                    27ebba8b475496614d71455219ed7275

                                    SHA1

                                    f1c1f4949b866d41b50d5f7b4df7f5f949d96c8a

                                    SHA256

                                    3cbb5543a0779a6baeb40ce7eb086f30c2ff4d010ece240ecbba35aa2bf5e3db

                                    SHA512

                                    e34149698ab057feaa15c9b3fc014d99079a3750e0ebe9b99e8dd6d89731fe2ea4b49642afc4571d799058be4070536b1a9e4fa7dd6f6723d7459488570282e1

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    0950964fd546f5c268a1a08772ba8090

                                    SHA1

                                    498574f6c3b88f190f8780f14dad73e0c66f3a6d

                                    SHA256

                                    6770d03f153e20adf75671244b2bf881ec18f24882ff326abd1b985577b87baa

                                    SHA512

                                    06fb0e4c57c122123c1c5e3387f9fe8023ba97e3708a60fed4d830d4a5e3fece54fa15d399b82733ed623827792625f7e53870add01e438283be1e372d1d4116

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    13bef0647aebaabd477d38699021331c

                                    SHA1

                                    c91cfd1b8eb45f2b38ac5eea30c77cff6c8995e2

                                    SHA256

                                    6e37a40ab9fda93a9c210f19ad216507a40b27b610ffb238a92e9a08851aa62b

                                    SHA512

                                    e5e011c8fb05640725dc4bccaa599ca2ea9878770abd7e9a0d7b48bd894172ec30209c9d3c1207d584fb8593317d5f07928e2444edbf11505c27a04417cce491

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_1

                                    Filesize

                                    264KB

                                    MD5

                                    f50f89a0a91564d0b8a211f8921aa7de

                                    SHA1

                                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                                    SHA256

                                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                    SHA512

                                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    73KB

                                    MD5

                                    b147962c27dc3bce31294aabcbd9a9ff

                                    SHA1

                                    8b21227c547d3c05f9a81a9827f98d8dd60fcc47

                                    SHA256

                                    19c853e8d00995784bd4a4dccc3c51a90a67b795a117b2a81aea974d9078ca9f

                                    SHA512

                                    5c4747df8354afca0941fb1975597394840a310924dfc55515e7a4c9df9bf2e68a7e4cbb99a8e4de21f1b4db926ced8feacebac6a9ea4140e2646eae457e2543

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    72KB

                                    MD5

                                    a230c91bc5220048db44533902471722

                                    SHA1

                                    c840fcace59ca5111aed27f774ced91b102ab18d

                                    SHA256

                                    390040e0614635c22628a61067a5c7169099c4628926dbbe245cd63649ad9e45

                                    SHA512

                                    800db8ff3fb47d329497dbe29a361dbca4e429d5178a7308c7a9493db749282724f7b95b0c025f82ffb487e6ca2f35e5435ff72ca9652999a0a2357cdea464f2

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    73KB

                                    MD5

                                    6e081de98a3ed9a6659a98c37870a92a

                                    SHA1

                                    f87df98b76a833500b05b4420c9bbbe26a9a4885

                                    SHA256

                                    194ea16037ba279285d72dc58c8d19e84dd6cb1d3af584132ffa7ad7e38e396a

                                    SHA512

                                    7bc55c2146e42dafd7fa7e502230847e0d9f7bca91c24b7b2e349bf68e68f28b1cb7369140abed745eadc01bfc43bd304e79f9c9165b11dfb604c8d595685d16

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                    Filesize

                                    2B

                                    MD5

                                    99914b932bd37a50b983c5e7c90ae93b

                                    SHA1

                                    bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                    SHA256

                                    44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                    SHA512

                                    27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                  • memory/3920-117-0x0000000000400000-0x00000000005DE000-memory.dmp

                                    Filesize

                                    1.9MB

                                  • memory/3920-128-0x0000000000400000-0x00000000005DE000-memory.dmp

                                    Filesize

                                    1.9MB

                                  • memory/3920-161-0x0000000000400000-0x00000000005DE000-memory.dmp

                                    Filesize

                                    1.9MB

                                  • memory/3920-126-0x0000000000400000-0x00000000005DE000-memory.dmp

                                    Filesize

                                    1.9MB

                                  • memory/3920-122-0x0000000000400000-0x00000000005DE000-memory.dmp

                                    Filesize

                                    1.9MB

                                  • memory/3920-191-0x0000000000400000-0x00000000005DE000-memory.dmp

                                    Filesize

                                    1.9MB

                                  • memory/3920-121-0x0000000000400000-0x00000000005DE000-memory.dmp

                                    Filesize

                                    1.9MB

                                  • memory/3920-120-0x0000000000400000-0x00000000005DE000-memory.dmp

                                    Filesize

                                    1.9MB

                                  • memory/3920-119-0x0000000000400000-0x00000000005DE000-memory.dmp

                                    Filesize

                                    1.9MB

                                  • memory/3920-118-0x0000000002310000-0x00000000023DE000-memory.dmp

                                    Filesize

                                    824KB