Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 10:18
Static task
static1
Behavioral task
behavioral1
Sample
Factuur4388.PDF.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Factuur4388.PDF.exe
Resource
win10v2004-20240508-en
General
-
Target
Factuur4388.PDF.exe
-
Size
772KB
-
MD5
95f60b5b36d63307d83e3f3de9675a1d
-
SHA1
da733991d9618b3a3bb5cc503ba0e860f1e8ea29
-
SHA256
f9ae18f90c502fc22c826eb8322a907fa6ddd2b38fdc1b10353d123b8910e674
-
SHA512
de63bb1117043ee0a7fb478c4a2ba3d283d7f3d71f39fdbe357d2aa403f8f4a4e7eafe53595794ef99c35156aedd3854ba2e015b259af573492e90c96e3f34ff
-
SSDEEP
12288:6sFxcCZxPEWJNy93q0DWm9+X6MSUJKzR9wz2U7qdyys2he3gxNMlKglt8RsrtUvy:bHP7gqXpKGNehe3x3r8CU
Malware Config
Extracted
C:\ProgramData\yxamqxj.html
http://jssestaew3e7ao3q.onion.cab
http://jssestaew3e7ao3q.tor2web.org
http://jssestaew3e7ao3q.onion
Signatures
-
CTB-Locker
Ransomware family which uses Tor to hide its C2 communications.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Control Panel\International\Geo\Nation byqlwkh.exe -
Executes dropped EXE 4 IoCs
pid Process 1276 byqlwkh.exe 2176 byqlwkh.exe 1300 byqlwkh.exe 320 byqlwkh.exe -
Loads dropped DLL 1 IoCs
pid Process 1276 byqlwkh.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini svchost.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-18\desktop.ini svchost.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: svchost.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat byqlwkh.exe File created C:\Windows\SysWOW64\x\system.pif byqlwkh.exe File created C:\Windows\SysWOW64\x\system.pif byqlwkh.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Documents\\!Decrypt-All-Files-dnfdbbb.bmp" Explorer.EXE -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3068 set thread context of 1836 3068 Factuur4388.PDF.exe 28 PID 1276 set thread context of 2176 1276 byqlwkh.exe 31 PID 1300 set thread context of 320 1300 byqlwkh.exe 36 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-dnfdbbb.txt svchost.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-dnfdbbb.bmp svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1680 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main byqlwkh.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch byqlwkh.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" byqlwkh.exe -
Modifies data under HKEY_USERS 23 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{f94fd0e4-0d7f-11ef-84d1-806e6f6e6963}\NukeOnDelete = "0" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{6335047e-0d48-11ef-8a5c-fed6c5e8d4ab}\NukeOnDelete = "0" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\LastEnum = 30002c007b00660039003400660064003000650034002d0030006400370066002d0031003100650066002d0038003400640031002d003800300036006500360066003600650036003900360033007d00000030002c007b00360033003300350030003400370065002d0030006400340038002d0031003100650066002d0038006100350063002d006600650064003600630035006500380064003400610062007d0000000000 svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Full = "%SystemRoot%\\System32\\imageres.dll,-54" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{f94fd0e4-0d7f-11ef-84d1-806e6f6e6963}\MaxCapacity = "14116" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{6335047e-0d48-11ef-8a5c-fed6c5e8d4ab} svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\ = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\TileWallpaper = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WallpaperStyle = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{6335047e-0d48-11ef-8a5c-fed6c5e8d4ab}\MaxCapacity = "2047" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Empty = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{f94fd0e4-0d7f-11ef-84d1-806e6f6e6963} svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID svchost.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3068 Factuur4388.PDF.exe 1836 Factuur4388.PDF.exe 1276 byqlwkh.exe 2176 byqlwkh.exe 2176 byqlwkh.exe 2176 byqlwkh.exe 2176 byqlwkh.exe 1300 byqlwkh.exe 320 byqlwkh.exe 320 byqlwkh.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2176 byqlwkh.exe Token: SeDebugPrivilege 2176 byqlwkh.exe Token: SeShutdownPrivilege 1196 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 320 byqlwkh.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 320 byqlwkh.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3068 Factuur4388.PDF.exe 1276 byqlwkh.exe 1300 byqlwkh.exe 320 byqlwkh.exe 320 byqlwkh.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1196 Explorer.EXE -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1836 3068 Factuur4388.PDF.exe 28 PID 3068 wrote to memory of 1836 3068 Factuur4388.PDF.exe 28 PID 3068 wrote to memory of 1836 3068 Factuur4388.PDF.exe 28 PID 3068 wrote to memory of 1836 3068 Factuur4388.PDF.exe 28 PID 3068 wrote to memory of 1836 3068 Factuur4388.PDF.exe 28 PID 3068 wrote to memory of 1836 3068 Factuur4388.PDF.exe 28 PID 3068 wrote to memory of 1836 3068 Factuur4388.PDF.exe 28 PID 3068 wrote to memory of 1836 3068 Factuur4388.PDF.exe 28 PID 2844 wrote to memory of 1276 2844 taskeng.exe 30 PID 2844 wrote to memory of 1276 2844 taskeng.exe 30 PID 2844 wrote to memory of 1276 2844 taskeng.exe 30 PID 2844 wrote to memory of 1276 2844 taskeng.exe 30 PID 1276 wrote to memory of 2176 1276 byqlwkh.exe 31 PID 1276 wrote to memory of 2176 1276 byqlwkh.exe 31 PID 1276 wrote to memory of 2176 1276 byqlwkh.exe 31 PID 1276 wrote to memory of 2176 1276 byqlwkh.exe 31 PID 1276 wrote to memory of 2176 1276 byqlwkh.exe 31 PID 1276 wrote to memory of 2176 1276 byqlwkh.exe 31 PID 1276 wrote to memory of 2176 1276 byqlwkh.exe 31 PID 1276 wrote to memory of 2176 1276 byqlwkh.exe 31 PID 2176 wrote to memory of 592 2176 byqlwkh.exe 9 PID 592 wrote to memory of 2140 592 svchost.exe 32 PID 592 wrote to memory of 2140 592 svchost.exe 32 PID 592 wrote to memory of 2140 592 svchost.exe 32 PID 2176 wrote to memory of 1196 2176 byqlwkh.exe 21 PID 2176 wrote to memory of 1680 2176 byqlwkh.exe 33 PID 2176 wrote to memory of 1680 2176 byqlwkh.exe 33 PID 2176 wrote to memory of 1680 2176 byqlwkh.exe 33 PID 2176 wrote to memory of 1680 2176 byqlwkh.exe 33 PID 2176 wrote to memory of 1300 2176 byqlwkh.exe 35 PID 2176 wrote to memory of 1300 2176 byqlwkh.exe 35 PID 2176 wrote to memory of 1300 2176 byqlwkh.exe 35 PID 2176 wrote to memory of 1300 2176 byqlwkh.exe 35 PID 1300 wrote to memory of 320 1300 byqlwkh.exe 36 PID 1300 wrote to memory of 320 1300 byqlwkh.exe 36 PID 1300 wrote to memory of 320 1300 byqlwkh.exe 36 PID 1300 wrote to memory of 320 1300 byqlwkh.exe 36 PID 1300 wrote to memory of 320 1300 byqlwkh.exe 36 PID 1300 wrote to memory of 320 1300 byqlwkh.exe 36 PID 1300 wrote to memory of 320 1300 byqlwkh.exe 36 PID 1300 wrote to memory of 320 1300 byqlwkh.exe 36 PID 592 wrote to memory of 2056 592 svchost.exe 37 PID 592 wrote to memory of 2056 592 svchost.exe 37 PID 592 wrote to memory of 2056 592 svchost.exe 37 PID 592 wrote to memory of 692 592 svchost.exe 39 PID 592 wrote to memory of 692 592 svchost.exe 39 PID 592 wrote to memory of 692 592 svchost.exe 39
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:2140
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:2056
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding2⤵PID:692
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Sets desktop wallpaper using registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\Factuur4388.PDF.exe"C:\Users\Admin\AppData\Local\Temp\Factuur4388.PDF.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\Factuur4388.PDF.exeC:\Users\Admin\AppData\Local\Temp\Factuur4388.PDF.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7EE93F14-A2B5-4100-AB1C-5A1DF9AE9D45} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\byqlwkh.exeC:\Users\Admin\AppData\Local\Temp\byqlwkh.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\byqlwkh.exeC:\Users\Admin\AppData\Local\Temp\byqlwkh.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows all4⤵
- Interacts with shadow copies
PID:1680
-
-
C:\Users\Admin\AppData\Local\Temp\byqlwkh.exe"C:\Users\Admin\AppData\Local\Temp\byqlwkh.exe" -u4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\byqlwkh.exeC:\Users\Admin\AppData\Local\Temp\byqlwkh.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:320
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD57e4c95b3e87edaf4ec8cd570f32151dc
SHA1927e2e92a4ba6a5e34eb6962a74569c06e8d83d3
SHA256d381db02620c4b390c93389d73b266574d6dea9a8a76f2c88a29deb53fc5dda8
SHA5120450af5768d5c35805fa5195ecf81a14f827f83e9429edf4ac9c547277b6bcbf4e76b22350f12802531b5a82022006821cd886cd97fd380a53f70d432a871754
-
Filesize
654B
MD58d0975483ba29024f80925e61729c9eb
SHA14020d13cb0ed157b08f82bbb8017b748f8c156b5
SHA25657150acb370d65f76a62b859eef0f379a3491adb9191d6ad56a6cbef08ceab34
SHA5122288448ea5fcefe4c7bb0e9899c161057efff5f6dfb1cfd23a6d7ab0717b753dc66ed8186eb1574b7db7e19fc6ee2b9404e254702e7432795a9c42afdaae6c43
-
Filesize
654B
MD56a934b98a21d6d143da031474fb2b0db
SHA13299b45bb319023ecc24ad9772b03897fc18fb6e
SHA2560fda3b44de4c42327fe925a7569093042ea1f03fa8a457fc3aa9a5a3e67b50ea
SHA512691f6884809bb3355ccfc811d548db4110c752da33016494306309592ef1bdba82af868ca6ba83a2a9147e8b19034924e3d46785cf22dc39d5635f434623d6c8
-
Filesize
64KB
MD50c988a52f02b9a25943a50990f6a55e5
SHA1da7307cd2ccdaea8c16d438e32f3a3e69f7fab53
SHA256faf118e14a9d9112246f81352a3824d6e3064de7ee1a785fd10ffcf759ae329c
SHA512755ca0505db24807d80321ec52dece11aab226d9e5c5ce03e6fe30660cdb9f8a5ddc624f1cb5a63f2ef507e7ebc3234de50ce2afe2c2bc12d6a8466957bce7ff
-
Filesize
772KB
MD595f60b5b36d63307d83e3f3de9675a1d
SHA1da733991d9618b3a3bb5cc503ba0e860f1e8ea29
SHA256f9ae18f90c502fc22c826eb8322a907fa6ddd2b38fdc1b10353d123b8910e674
SHA512de63bb1117043ee0a7fb478c4a2ba3d283d7f3d71f39fdbe357d2aa403f8f4a4e7eafe53595794ef99c35156aedd3854ba2e015b259af573492e90c96e3f34ff
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88