Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

31/03/2024, 09:16 UTC

240331-k8y2eahd2s 10

31/03/2024, 09:07 UTC

240331-k3d42shh42 10

20/03/2024, 19:30 UTC

240320-x7y18shg5v 10

General

  • Target

    2024-03-20_1b2fdf47aaaccaf622e33cb4dd63e8e2_wannacry

  • Size

    372KB

  • Sample

    240320-x7y18shg5v

  • MD5

    1b2fdf47aaaccaf622e33cb4dd63e8e2

  • SHA1

    1130c9d40bc5ab004918a509811f914605594961

  • SHA256

    24266d8af5e54a179ca62fe8ba586a9bced5e39565ad05f33583a3fc8f509613

  • SHA512

    f494e23997ba85df3fcdaaaeb1d6c056de6f7b6a22ecf8df4797b302016deafea0d2030058680baa521cae93cf5921b3bd58d1750274819f866a868beff2739c

  • SSDEEP

    3072:doeNsCr9h4ca2aHBSCAb2+IPdG1UlcaVSptR4jiYFD:nNr9h4ca7SCdI12cTtRcf

Malware Config

Targets

    • Target

      2024-03-20_1b2fdf47aaaccaf622e33cb4dd63e8e2_wannacry

    • Size

      372KB

    • MD5

      1b2fdf47aaaccaf622e33cb4dd63e8e2

    • SHA1

      1130c9d40bc5ab004918a509811f914605594961

    • SHA256

      24266d8af5e54a179ca62fe8ba586a9bced5e39565ad05f33583a3fc8f509613

    • SHA512

      f494e23997ba85df3fcdaaaeb1d6c056de6f7b6a22ecf8df4797b302016deafea0d2030058680baa521cae93cf5921b3bd58d1750274819f866a868beff2739c

    • SSDEEP

      3072:doeNsCr9h4ca2aHBSCAb2+IPdG1UlcaVSptR4jiYFD:nNr9h4ca7SCdI12cTtRcf

    • Chaos

      Ransomware family first seen in June 2021.

    • Chaos Ransomware

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Detects command variations typically used by ransomware

    • Modifies boot configuration data using bcdedit

    • Renames multiple (199) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.