Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
f0c2c9663215a97b04f1f97cb34c99c2cf06ba502fd1f1ad4922ead45fa442a6
-
Size
666KB
-
Sample
230822-kxtbsacf9z
-
MD5
bb442cfc088a89e0c353ed20fb8cbf8b
-
SHA1
1477ae595f2fb3cf7ffdee788b748db253236d0c
-
SHA256
f0c2c9663215a97b04f1f97cb34c99c2cf06ba502fd1f1ad4922ead45fa442a6
-
SHA512
ea2b42aa7e9aab775cf607ba0e5034edde3b07a1d913109337cd32bff4f45f6d054e434ccbccdc5a0dbf6901db7431d279c11f8dd8b1b56af1f84dfc3006f5e4
-
SSDEEP
12288:ZYW1LNT35lDbK/LIVaN8+T7vwqyqhYMhWt918vulA2C9+m:dd35lDbKDIwWUDyqS5omTC9+
Behavioral task
behavioral1
Sample
f0c2c9663215a97b04f1f97cb34c99c2cf06ba502fd1f1ad4922ead45fa442a6.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
f0c2c9663215a97b04f1f97cb34c99c2cf06ba502fd1f1ad4922ead45fa442a6.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
\Device\HarddiskVolume1\Boot\!-Recovery_Instructions-!.html
<h2>[email protected]</h2>
https://tox.chat/download.html</p>
Extracted
\Device\HarddiskVolume1\Boot\!-Recovery_Instructions-!.html
<h2>[email protected]</h2>
https://tox.chat/download.html</p>
Targets
-
-
Target
f0c2c9663215a97b04f1f97cb34c99c2cf06ba502fd1f1ad4922ead45fa442a6
-
Size
666KB
-
MD5
bb442cfc088a89e0c353ed20fb8cbf8b
-
SHA1
1477ae595f2fb3cf7ffdee788b748db253236d0c
-
SHA256
f0c2c9663215a97b04f1f97cb34c99c2cf06ba502fd1f1ad4922ead45fa442a6
-
SHA512
ea2b42aa7e9aab775cf607ba0e5034edde3b07a1d913109337cd32bff4f45f6d054e434ccbccdc5a0dbf6901db7431d279c11f8dd8b1b56af1f84dfc3006f5e4
-
SSDEEP
12288:ZYW1LNT35lDbK/LIVaN8+T7vwqyqhYMhWt918vulA2C9+m:dd35lDbKDIwWUDyqS5omTC9+
-
MedusaLocker payload
-
Renames multiple (212) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (292) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
2