Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12/05/2024, 03:29

General

  • Target

    2024-05-12_0fb4787dcc4bcb1f6f78a70e792fbc86_wannacry.exe

  • Size

    100KB

  • MD5

    0fb4787dcc4bcb1f6f78a70e792fbc86

  • SHA1

    e89c85f8495282ff03e91acab0ce8ebcba8d3299

  • SHA256

    d9773300b2b43d9c2091b02744e472df1fb1e0ab920d0f71eea30647fd2a819b

  • SHA512

    d530433119c8ee0117280cbdd9e88d374351ceb887f7e4b0e1481a3c08d27930075f3ca1c87d8b3f43da46adcbcc8a3d8ed3741456a6669b62414a670b58dbd2

  • SSDEEP

    3072:ioVUMbr91bmrmNi0XJdsh55gvms+sUnFhKoAvog:nr91Tf5aQv1+YP

Malware Config

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 3 IoCs
  • Detects command variations typically used by ransomware 3 IoCs
  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 34 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-12_0fb4787dcc4bcb1f6f78a70e792fbc86_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-12_0fb4787dcc4bcb1f6f78a70e792fbc86_wannacry.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Sets desktop wallpaper using registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2948
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    100KB

    MD5

    0fb4787dcc4bcb1f6f78a70e792fbc86

    SHA1

    e89c85f8495282ff03e91acab0ce8ebcba8d3299

    SHA256

    d9773300b2b43d9c2091b02744e472df1fb1e0ab920d0f71eea30647fd2a819b

    SHA512

    d530433119c8ee0117280cbdd9e88d374351ceb887f7e4b0e1481a3c08d27930075f3ca1c87d8b3f43da46adcbcc8a3d8ed3741456a6669b62414a670b58dbd2

  • C:\Users\Admin\Documents\read_it.txt

    Filesize

    19B

    MD5

    91e642f2ab626c3780c0b251eae5f7b8

    SHA1

    f03b96a9cb9ea2646c3bf3a13a3de5e272675c80

    SHA256

    41f25a9ca2b5f87189f0073199c79285d20ca1fb43b48c44f054027ecffa6e90

    SHA512

    a83781fb7168049c04cc6c10497d7c20b668a39752e9b0f2f5120d514189892cf79d9b17979f373351eefa1f6a99d74e9088bae5e54a717eb39aac1c2d539ce5

  • memory/2888-0-0x000007FEF5F13000-0x000007FEF5F14000-memory.dmp

    Filesize

    4KB

  • memory/2888-1-0x00000000002B0000-0x00000000002D0000-memory.dmp

    Filesize

    128KB

  • memory/2948-7-0x0000000000E00000-0x0000000000E20000-memory.dmp

    Filesize

    128KB

  • memory/2948-12-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

    Filesize

    9.9MB

  • memory/2948-18-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

    Filesize

    9.9MB

  • memory/2948-430-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

    Filesize

    9.9MB