Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
9e7723372ff1ee68d817cf9ac7de7c0994d528e6fcf7fb3fcf17125e4cb59d0c
-
Size
666KB
-
Sample
230822-kw74jsbb76
-
MD5
1a1bd3c9901502ba239c242a43ffc7d3
-
SHA1
1365c2d7edcf5e6e970bd7a8257a24eece404098
-
SHA256
9e7723372ff1ee68d817cf9ac7de7c0994d528e6fcf7fb3fcf17125e4cb59d0c
-
SHA512
85fc17144dd0d739444acdb859b76c257570005e5587e9f49ede70cbac1a3b8eaf4325e745bff888fdbcd25174be750bb752bbb16185d6fb3df81cbd6a977b25
-
SSDEEP
12288:ZYW1LNT35lDbK/LIVaN8+T7vwqyqhYMhWt918vulAiC9+m:dd35lDbKDIwWUDyqS5om3C9+
Behavioral task
behavioral1
Sample
9e7723372ff1ee68d817cf9ac7de7c0994d528e6fcf7fb3fcf17125e4cb59d0c.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9e7723372ff1ee68d817cf9ac7de7c0994d528e6fcf7fb3fcf17125e4cb59d0c.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
\Device\HarddiskVolume1\Boot\!-Recovery_Instructions-!.html
<h2>[email protected]</h2>
https://tox.chat/download.html</p>
Extracted
\Device\HarddiskVolume1\Boot\!-Recovery_Instructions-!.html
<h2>[email protected]</h2>
https://tox.chat/download.html</p>
Targets
-
-
Target
9e7723372ff1ee68d817cf9ac7de7c0994d528e6fcf7fb3fcf17125e4cb59d0c
-
Size
666KB
-
MD5
1a1bd3c9901502ba239c242a43ffc7d3
-
SHA1
1365c2d7edcf5e6e970bd7a8257a24eece404098
-
SHA256
9e7723372ff1ee68d817cf9ac7de7c0994d528e6fcf7fb3fcf17125e4cb59d0c
-
SHA512
85fc17144dd0d739444acdb859b76c257570005e5587e9f49ede70cbac1a3b8eaf4325e745bff888fdbcd25174be750bb752bbb16185d6fb3df81cbd6a977b25
-
SSDEEP
12288:ZYW1LNT35lDbK/LIVaN8+T7vwqyqhYMhWt918vulAiC9+m:dd35lDbKDIwWUDyqS5om3C9+
-
MedusaLocker payload
-
Renames multiple (194) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (288) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
2