Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
VirusShare_1449cdc2acb385e8326dfd0364e67d25
-
Size
339KB
-
Sample
240610-mrmcdsgf82
-
MD5
1449cdc2acb385e8326dfd0364e67d25
-
SHA1
27ec595e01e4c89fb17a895bced8b84871355df4
-
SHA256
7007b16d76f879588fbbaef6ed77de0be778d38b09ace3740d50068937334dab
-
SHA512
d660379a13c169ca0690a64cf5427d75ca71030e61bcc2795d6ddbd41d21028b453487c170db74303aa6c2c76d188272c8f6ad049ac4e579c6aaf738590d8c0b
-
SSDEEP
6144:Y9Jy1mYCrFLXOppiFWDKvZBjtgnbEufzKB/xL4lkY:YvyUYsXWpiVztebEWz+Z4eY
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_1449cdc2acb385e8326dfd0364e67d25.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_1449cdc2acb385e8326dfd0364e67d25.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\restore_files_ljtvu.txt
http://lk2gaflsgh.jgy658snfyfnvh.com/7ADE2A589D2A591
http://dg62wor94m.sdsfg834mfuuw.com/7ADE2A589D2A591
https://djdkduep62kz4nzx.onion.to/7ADE2A589D2A591
http://djdkduep62kz4nzx.onion/7ADE2A589D2A591
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\restore_files_ljtvu.html
https://djdkduep62kz4nzx.onion.to/7ADE2A589D2A591</a>
Extracted
C:\Program Files\7-Zip\Lang\restore_files_ijkso.txt
http://lk2gaflsgh.jgy658snfyfnvh.com/CD1A4ACA94CFB26B
http://dg62wor94m.sdsfg834mfuuw.com/CD1A4ACA94CFB26B
https://djdkduep62kz4nzx.onion.to/CD1A4ACA94CFB26B
http://djdkduep62kz4nzx.onion/CD1A4ACA94CFB26B
Extracted
C:\Program Files\7-Zip\Lang\restore_files_ijkso.html
https://djdkduep62kz4nzx.onion.to/CD1A4ACA94CFB26B</a>
Targets
-
-
Target
VirusShare_1449cdc2acb385e8326dfd0364e67d25
-
Size
339KB
-
MD5
1449cdc2acb385e8326dfd0364e67d25
-
SHA1
27ec595e01e4c89fb17a895bced8b84871355df4
-
SHA256
7007b16d76f879588fbbaef6ed77de0be778d38b09ace3740d50068937334dab
-
SHA512
d660379a13c169ca0690a64cf5427d75ca71030e61bcc2795d6ddbd41d21028b453487c170db74303aa6c2c76d188272c8f6ad049ac4e579c6aaf738590d8c0b
-
SSDEEP
6144:Y9Jy1mYCrFLXOppiFWDKvZBjtgnbEufzKB/xL4lkY:YvyUYsXWpiVztebEWz+Z4eY
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (363) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-