Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

24/12/2023, 18:24

231224-w112ksffdr 10

24/12/2023, 18:21

231224-wzcycsfchm 10

07/11/2023, 17:16

231107-vs31jadh73 10

Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 18:24

General

  • Target

    95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe

  • Size

    765KB

  • MD5

    52f22c2a5b2c339e75f176bf5bfcb3f3

  • SHA1

    0a3b96aa59d5eda04c731bfb9c2ba7fef997d1b9

  • SHA256

    95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4

  • SHA512

    ec5f24367c46ff558110022ad8e1106fe5d1d9b9f94cf423b0cd1e1cd7d5ee3111e16cc12ccf3d6e65c5a5d5358691726172e33fb6338e1b7291be9566766da8

  • SSDEEP

    12288:mokzmesNcOJCG4jm2E2SLZJsiXlg8XGB2P3yo1jaUPC4t56ha6DJof5:izk/QDo2SVJsylBXjVNPyvu

Malware Config

Extracted

Family

djvu

C2

http://zexeq.com/test1/get.php

Attributes
  • extension

    .jzeq

  • offline_id

    4FMaMDK6uqPZOxJj64677pqiSGF54A1Dam9zfUt1

  • payload_url

    http://colisumy.com/dl/build2.exe

    http://zexeq.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-TAbs6oTGSU Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0821ASdw

rsa_pubkey.plain

Signatures

  • Detected Djvu ransomware 15 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe
    C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 0821ASdw3sjR7F8QCGeG3mmJ8Ydub1mGOIlnllHAObOY5
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe
      C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 0821ASdw3sjR7F8QCGeG3mmJ8Ydub1mGOIlnllHAObOY5
      2⤵
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2124
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\9baeba8c-8ec4-4063-8af2-371e3b47c381" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:2488
      • C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe
        "C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2544
        • C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe
          "C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Loads dropped DLL
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:644
          • C:\Users\Admin\AppData\Local\b1bf6144-6a8f-4771-be15-31923fea6f80\build3.exe
            "C:\Users\Admin\AppData\Local\b1bf6144-6a8f-4771-be15-31923fea6f80\build3.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2856
  • C:\Windows\SysWOW64\schtasks.exe
    /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
    1⤵
    • Creates scheduled task(s)
    PID:1720
  • C:\Users\Admin\AppData\Local\b1bf6144-6a8f-4771-be15-31923fea6f80\build3.exe
    "C:\Users\Admin\AppData\Local\b1bf6144-6a8f-4771-be15-31923fea6f80\build3.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2704
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {2AB6DA9F-DEF2-4E53-94F7-2B9522F8380F} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:384
    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:564
      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:704
    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:2428
      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        3⤵
        • Executes dropped EXE
        PID:2052
  • C:\Windows\SysWOW64\schtasks.exe
    /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
    1⤵
    • Creates scheduled task(s)
    PID:1464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    ad1b831e6b39763c118dd6bf34d8641a

    SHA1

    43e23a3d91315736f59751521ade3224f45ece86

    SHA256

    fe673f5da906667a2f5b08f086d292da711c854fce0268f8e4ed7d4d6e62d58a

    SHA512

    cabe0d43a8bc792b9725af5bdb918a7edfe4e7542771cceb57d8686fab0c2c1a5201346f8e960ee31cfa46c1c291d59bcee04b867ff43dfea2520066c8da3fc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    9ba428eb4f55a9269ba33ba422304f38

    SHA1

    029a2fc3683b1f7ef3f79c819fb599793234665e

    SHA256

    2719c5bb31c171d47115f850fbe2beede1e073118be42c745d4b1cc972c334e4

    SHA512

    27f17e0349d3a74aee09b19d548471167c33f829835406456c74b1ccce6fd22faf1aa4ff6b6338c053da5e2f54cbf0a9a4d87b0c323c64c13b08cd977dcc3f35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    358aa39dd53f64ed52c584230cbdc9c3

    SHA1

    f5a0fa92a8f077d13f2513c882353502dab2544c

    SHA256

    047498e1b4984afde31e217d6de12e01cfe558d5634fafc8bb51e3e1b2e134f5

    SHA512

    5fa8f2e3fa6540b4abac93f303b305d7e07c46b26ea5cd64b5f2fd9a9d5fd68acd38e8e2ebb2543f4246a0727e018ce551c9df75a49f210d7aa6eab91f856182

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    392B

    MD5

    0fc0d097fd0ccf9a8d9f3e508798e2c0

    SHA1

    b830995e5f4a42af523805d567da4240b4739adc

    SHA256

    1cef0baf000c409ba1645de0231ded9fe9c109cb03de99ab733f648e3bb9605f

    SHA512

    7a647036c79458b187fd5fa7118c1915ff24f2341d3b0a0a0643bc4faacdb62cc2b0e36397e43b02f7f470ca9d6d91f71808ebcd62b7580a21c7a9014b0cdc76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    4db2c9ae9cec5288c1338ff7f085c9ed

    SHA1

    3dcfbdf48d6b18186ae9bd868efec9e94733383f

    SHA256

    1e8fe8d51a465e5ce3e990f774bc660ffeec3af966d1bfd9d65e7745efc490f4

    SHA512

    3271ce3c51753f9c37d99b45c718cf1f3c8ea4bc73c52df22254b2c4fc164a0fe42a158feda352b43f4ecafcdc2d82139032b031434926aade14be742c518431

  • C:\Users\Admin\AppData\Local\9baeba8c-8ec4-4063-8af2-371e3b47c381\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe

    Filesize

    474KB

    MD5

    69eee9dc4b99e6fb2da1e5f257dc0bd2

    SHA1

    7cf21aef81d2f114fc276302f270dbfed310cf8c

    SHA256

    d0adeedcf4186892335286e24317a9015466f3c1e993245693aa0b15009d1c7e

    SHA512

    82563880010d13b7a0f15a2a47d44c4f6502c26ca5ded3dc3bdcb2e6bd460c4fe8099ec11cb28328544a585f206b19c3b46e60a8307df61d2df2a968b112a561

  • C:\Users\Admin\AppData\Local\Temp\Tar2C5F.tmp

    Filesize

    9KB

    MD5

    547ce3d6338e05de0a5865ed68ff64cf

    SHA1

    48d8c391a238c3a20e6ac0e3b7df0712976c9add

    SHA256

    c2fecd54ad6d58b39f4950808ac49261bc879317f05c714867cd9fcad412d9d0

    SHA512

    ebfd670ea9433b2b39d4f8a3138f84d183f308991200c284e0a3f35274efa438a518922d851cb64c244dcbaddc64fdead3ed89b6f8980857f35510b871545fb1

  • C:\Users\Admin\AppData\Local\b1bf6144-6a8f-4771-be15-31923fea6f80\build3.exe

    Filesize

    128KB

    MD5

    6d971c2e5c625a37033034e705f626c6

    SHA1

    c0148fa8412616e98dd37a0e4dd474fb4dcc9874

    SHA256

    a4e3c8ff336f180467f4a0ee49c9ad5877d46450a2a87db12bf5d25a5767e739

    SHA512

    5165c1e2d827a13922e8b4a9b102acaf408161a1149fd74064b9daf41a9438acd4737f9f54a11f90cb3c42eaf6e1b66bb3857e8683c112a4c69a20191d230cc7

  • C:\Users\Admin\AppData\Local\b1bf6144-6a8f-4771-be15-31923fea6f80\build3.exe

    Filesize

    76KB

    MD5

    0f2ffdb74eae0ef39f31d82f7757d0c9

    SHA1

    216ba830abd765a1db6cd19963b773f3d283415b

    SHA256

    8e6144145f3484f1a117948f0a08be9d8689f1bca5dc2ae7c9d6c22eb74290f9

    SHA512

    01b77643a8ddfc006c0bd5c868d71e169988ff43057a3f4424e7b63ee41a3dda56ce7256bf162ba65151dac73968a163e75e81a536ee8814471b3f0b6adf2835

  • C:\Users\Admin\AppData\Local\b1bf6144-6a8f-4771-be15-31923fea6f80\build3.exe

    Filesize

    203KB

    MD5

    85f2f4583d149ccf47d681ef27b98354

    SHA1

    f9e221dfc962c5a9cdef578d44e504e4ca72aa3e

    SHA256

    79f3d0706cfa6b79253ef1f1a9d8dfde042f319f9b8b224760ac6cffaf94091f

    SHA512

    1b9005280bb8bd5ada5c01a99513008941ef83a19fe5e67fdab2f32eb263c234a7792cd233cbbfa127fe3125f29477ccb163419b53c1e0551ca01b9d2f3b77ce

  • C:\Users\Admin\AppData\Local\b1bf6144-6a8f-4771-be15-31923fea6f80\build3.exe

    Filesize

    47KB

    MD5

    1de9ea3fd15e12337004d458739d9cb2

    SHA1

    f80c972e57792b7a45647ad0d405d64485e902e1

    SHA256

    626d00428f172ad0ce4e20b790fd2b74fce0bf4eb34c5f63b77fc07b9f4cf12b

    SHA512

    39cc1b88d8e710c2278bb0917ae9b756a807f240d41e332a8660f9cef1be26cd55210ee6459b049327f52f6866ba2f9cc5f2ec31ae8e88161df171301f746c45

  • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

    Filesize

    241KB

    MD5

    81bb6457c59ed3ba122eab8084c25c40

    SHA1

    fe2aac0d3fb8ce9598bfedaaef5b56782c30da7b

    SHA256

    b0e7c9281617e3b1ae303e78f43e8849da2fcab7010706bd7319a2108b1096e4

    SHA512

    b6273f8b8423bf38783577f564d478688d36a41de1f3fdf84be30ce482353e2b22f58dcdbb2d4ec2b2f493382a9bdcda4e20f564fbcd4f0e39d3f40ec1c684be

  • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

    Filesize

    222KB

    MD5

    e331d8f6459604b5e4fb60583b7cb42a

    SHA1

    edd4c8799beb138a3032139d2b371609ea663060

    SHA256

    e7a428619c8a5f0972ffe82e1a8d59a62d9aed6d4f1e4c7ae4eeb04c79d07b5d

    SHA512

    96c4abdf701b1c859c07a3a29fa79e857b13f38f345420083ebfb2cf11fe64e28036b567d70fd2d2cffffb2be087f54fac11552e1c2d7bf36ea17d14eab7406a

  • \Users\Admin\AppData\Local\b1bf6144-6a8f-4771-be15-31923fea6f80\build3.exe

    Filesize

    299KB

    MD5

    41b883a061c95e9b9cb17d4ca50de770

    SHA1

    1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

    SHA256

    fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

    SHA512

    cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

  • \Users\Admin\AppData\Local\b1bf6144-6a8f-4771-be15-31923fea6f80\build3.exe

    Filesize

    278KB

    MD5

    1fa259bf1ff6b21b742f293186163bad

    SHA1

    df0e35c5659bc0fbe302502c20399462ccda5084

    SHA256

    9c057f90ae7d68bdd9cf42cce76c98dbde3f7f1eddc772a1cad3ffed6f5950fb

    SHA512

    59819e315329bf55390596c695d05178da92915a42d65e21c0b95d3856854c05be98303e589c2f5e162fbfe35deaf60b995b3d9d68ad6f9000b9bef8e94427fa

  • memory/564-115-0x0000000000C92000-0x0000000000CA2000-memory.dmp

    Filesize

    64KB

  • memory/644-99-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/644-104-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/644-69-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/644-101-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/644-102-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/644-70-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/644-103-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/644-52-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/644-53-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/644-81-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1688-6-0x00000000020D0000-0x00000000021EB000-memory.dmp

    Filesize

    1.1MB

  • memory/1688-4-0x00000000008C0000-0x0000000000952000-memory.dmp

    Filesize

    584KB

  • memory/1688-0-0x00000000008C0000-0x0000000000952000-memory.dmp

    Filesize

    584KB

  • memory/2124-3-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2124-7-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2124-44-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2124-1-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2124-8-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2428-138-0x00000000002D0000-0x00000000003D0000-memory.dmp

    Filesize

    1024KB

  • memory/2544-46-0x00000000002E0000-0x0000000000372000-memory.dmp

    Filesize

    584KB

  • memory/2544-47-0x00000000002E0000-0x0000000000372000-memory.dmp

    Filesize

    584KB

  • memory/2704-87-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2704-85-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2704-92-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2704-94-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2856-91-0x0000000000220000-0x0000000000224000-memory.dmp

    Filesize

    16KB

  • memory/2856-89-0x0000000000A02000-0x0000000000A13000-memory.dmp

    Filesize

    68KB