Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7.exe
Resource
win10v2004-20230915-en
General
-
Target
3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7.exe
-
Size
283KB
-
MD5
2773e3dc59472296cb0024ba7715a64e
-
SHA1
27d99fbca067f478bb91cdbcb92f13a828b00859
-
SHA256
3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7
-
SHA512
6ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262
-
SSDEEP
6144:7fukPLPvucHiQQQ4uuy9ApZbZWxcZt+kTfMLJTOAZiYSXjjeqXus:7fu5cCT7yYlWi8kTfMLJTOAZiYSXjyqX
Malware Config
Signatures
-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Renames multiple (427) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 2148 drpbx.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Frfx\\firefox.exe" 3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrdeush.dat drpbx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Pine_Lumber.jpg drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\sa-jdi.jar.fun drpbx.exe File created C:\Program Files\7-Zip\Lang\mn.txt.fun drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Apothecary.xml.fun drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Paper.xml.fun drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\include\classfile_constants.h.fun drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Slipstream.xml.fun drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ExecutiveLetter.dotx.fun drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\kaa.txt.fun drpbx.exe File created C:\Program Files\7-Zip\Lang\sa.txt.fun drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt drpbx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\photoedge_buttongraphic.png drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Verve.xml drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Equity.xml drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ProjectStatusReport.potx.fun drpbx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.jpg drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Civic.xml drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Origin.xml.fun drpbx.exe File created C:\Program Files\7-Zip\Lang\af.txt.fun drpbx.exe File created C:\Program Files\7-Zip\Lang\id.txt.fun drpbx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\cloud_Thumbnail.bmp drpbx.exe File opened for modification C:\Program Files\Internet Explorer\Timeline.cpu.xml drpbx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrfrash.dat drpbx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\icon.png drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\ant-javafx.jar.fun drpbx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsdan.xml drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\include\jvmticmlr.h.fun drpbx.exe File opened for modification C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt drpbx.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\TableTextServiceSimplifiedZhengMa.txt drpbx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_highlights_Thumbnail.bmp drpbx.exe File created C:\Program Files\7-Zip\Lang\pa-in.txt.fun drpbx.exe File created C:\Program Files\7-Zip\Lang\tr.txt.fun drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\THIRDPARTYLICENSEREADME.txt.fun drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Thatch.xml.fun drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\PersonalMonthlyBudget.xltx drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt drpbx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsplk.xml drpbx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\drag.png drpbx.exe File created C:\Program Files\7-Zip\Lang\gu.txt.fun drpbx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Sand_Paper.jpg drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt drpbx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\logo.png drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Module.xml.fun drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\jvmti.h drpbx.exe File created C:\Program Files\Java\jre7\lib\plugin.jar.fun drpbx.exe File created C:\Program Files\7-Zip\readme.txt.fun drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt drpbx.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Bears.jpg drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ExecutiveNewsletter.dotx.fun drpbx.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Media Renderer\connectionmanager_dmr.xml drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Austin.xml.fun drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Slipstream.xml.fun drpbx.exe File created C:\Program Files\7-Zip\Lang\pl.txt.fun drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Oriel.xml.fun drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt drpbx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Heart_VideoInset.png drpbx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\logo.png drpbx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2148 2252 3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7.exe 28 PID 2252 wrote to memory of 2148 2252 3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7.exe 28 PID 2252 wrote to memory of 2148 2252 3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7.exe"C:\Users\Admin\AppData\Local\Temp\3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe"C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\AppData\Local\Temp\3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
283KB
MD52773e3dc59472296cb0024ba7715a64e
SHA127d99fbca067f478bb91cdbcb92f13a828b00859
SHA2563ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7
SHA5126ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262
-
Filesize
283KB
MD52773e3dc59472296cb0024ba7715a64e
SHA127d99fbca067f478bb91cdbcb92f13a828b00859
SHA2563ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7
SHA5126ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262