Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
risen_exe_3b685f4a59211225997256a5cd900f44953bba276b6eb92545966b35b6ef89b5
-
Size
149KB
-
Sample
240515-ta25vagg57
-
MD5
0444b3d690823924667302cfae1f0655
-
SHA1
737d0d001e60ce20c8f35a2bbac0f4d525b96174
-
SHA256
3b685f4a59211225997256a5cd900f44953bba276b6eb92545966b35b6ef89b5
-
SHA512
5dacf16ce60bb5191708de906a920ab63fa3d5458fc7331013d8c3997beae802f0ea4b318392b1c4c6e15417a15423661e6bb4cb072adb33338493b1aac2c57d
-
SSDEEP
3072:wz5vBHTp2Obwai/tge32Vhh53u8rrsusAkeOe494flyntoGNout:wtvBlZc/tZ3yh53u8rg/AkFe4ufkntVZ
Behavioral task
behavioral1
Sample
risen_exe_3b685f4a59211225997256a5cd900f44953bba276b6eb92545966b35b6ef89b5.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
risen_exe_3b685f4a59211225997256a5cd900f44953bba276b6eb92545966b35b6ef89b5.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
C:\ProgramData\$Risen_Guide.hta
http://s2wk77h653qn54csf4gp52orhem4y72dgxsquxulf255pcymazeepbyd.onion/
Targets
-
-
Target
risen_exe_3b685f4a59211225997256a5cd900f44953bba276b6eb92545966b35b6ef89b5
-
Size
149KB
-
MD5
0444b3d690823924667302cfae1f0655
-
SHA1
737d0d001e60ce20c8f35a2bbac0f4d525b96174
-
SHA256
3b685f4a59211225997256a5cd900f44953bba276b6eb92545966b35b6ef89b5
-
SHA512
5dacf16ce60bb5191708de906a920ab63fa3d5458fc7331013d8c3997beae802f0ea4b318392b1c4c6e15417a15423661e6bb4cb072adb33338493b1aac2c57d
-
SSDEEP
3072:wz5vBHTp2Obwai/tge32Vhh53u8rrsusAkeOe494flyntoGNout:wtvBlZc/tZ3yh53u8rg/AkFe4ufkntVZ
-
Deletes NTFS Change Journal
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
-
Clears Windows event logs
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (2898) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables Task Manager via registry modification
-
Disables use of System Restore points
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Windows Management Instrumentation
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
4