Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
26/08/2023, 06:54
Static task
static1
Behavioral task
behavioral1
Sample
Ransomware-Maker.cs.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Ransomware-Maker.cs.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
decrypt.py
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
decrypt.py
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
virus.js
Resource
win7-20230824-en
Behavioral task
behavioral6
Sample
virus.js
Resource
win10v2004-20230703-en
General
-
Target
decrypt.py
-
Size
2KB
-
MD5
9f4ba2880811dd1cd962c1ebc2be97df
-
SHA1
c7edafa685312532b7269ae2de77284510e01fc1
-
SHA256
42714032aba5c066f0ce7dc542e522caf9d42703efe6da6eba7cb82a6349d19e
-
SHA512
c2f555d707a99f5724929d60560bc547af08d10b0cbe2aceef212fcb1083d7d998a6220b81c366a31e9835d07d1114924879b93093ccad04e256d0e53b3d5d4d
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\.py rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2836 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2836 AcroRd32.exe 2836 AcroRd32.exe 2836 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2876 3064 cmd.exe 29 PID 3064 wrote to memory of 2876 3064 cmd.exe 29 PID 3064 wrote to memory of 2876 3064 cmd.exe 29 PID 2876 wrote to memory of 2836 2876 rundll32.exe 30 PID 2876 wrote to memory of 2836 2876 rundll32.exe 30 PID 2876 wrote to memory of 2836 2876 rundll32.exe 30 PID 2876 wrote to memory of 2836 2876 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\decrypt.py1⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\decrypt.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\decrypt.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52113edde37c64cd39a7454da39793364
SHA121442be69176d38db258aad5a2c967e9135a8301
SHA2561abe542b58dd04f807d9d218da3ab1e9933c1c397eec3330a58a242d62e06aa6
SHA5125766dc88e05aa3da842b82c17551d7a67de45b1a76d0dacb63b15a7073ca615b9d1b1a108776616665e4e481a5e3e1a8270088b5ed08d24c6a9a744a7f8bc13e