Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
VirusShare_1eb412a5f6400eb490a8698dc08129da
-
Size
344KB
-
Sample
240610-mtl5eagg46
-
MD5
1eb412a5f6400eb490a8698dc08129da
-
SHA1
065daf13ce7d8adfca48fb1405f76b122b5edd62
-
SHA256
a38207f0e70d472afbbde057caa046c47c56d86d02b3c2a633a2e08f02e7274a
-
SHA512
7155af1756cd1639b9d7baf96caad6f658d28cd64723755dae657adb156fbb9cc107cecc68c376dd2c0bcdc532aef6233c00418e91fa9f35728d4c759daa5c70
-
SSDEEP
6144:fclgBCoMvJpr3IZVXBRVRC3BMaXGRTuKYAyqeT6y52cZuvrvD1hNVWfO6:f5C9Jpr3I3XBRi3WaXGEKXnW6RjPkv
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_1eb412a5f6400eb490a8698dc08129da.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_1eb412a5f6400eb490a8698dc08129da.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\how_recover+twy.txt
http://vr6g2curb2kcidou.encpayment23.com/EC3565E91F6AB2D4
http://vr6g2curb2kcidou.expay34.com/EC3565E91F6AB2D4
http://psbc532jm8c.hsh73cu37n1.net/EC3565E91F6AB2D4
https://vr6g2curb2kcidou.onion.to/EC3565E91F6AB2D4
http://vr6g2curb2kcidou.onion/EC3565E91F6AB2D4
Extracted
C:\PerfLogs\how_recover+xuh.txt
http://vr6g2curb2kcidou.encpayment23.com/6AD13A24B781BD23
http://vr6g2curb2kcidou.expay34.com/6AD13A24B781BD23
http://psbc532jm8c.hsh73cu37n1.net/6AD13A24B781BD23
https://vr6g2curb2kcidou.onion.to/6AD13A24B781BD23
http://vr6g2curb2kcidou.onion/6AD13A24B781BD23
Targets
-
-
Target
VirusShare_1eb412a5f6400eb490a8698dc08129da
-
Size
344KB
-
MD5
1eb412a5f6400eb490a8698dc08129da
-
SHA1
065daf13ce7d8adfca48fb1405f76b122b5edd62
-
SHA256
a38207f0e70d472afbbde057caa046c47c56d86d02b3c2a633a2e08f02e7274a
-
SHA512
7155af1756cd1639b9d7baf96caad6f658d28cd64723755dae657adb156fbb9cc107cecc68c376dd2c0bcdc532aef6233c00418e91fa9f35728d4c759daa5c70
-
SSDEEP
6144:fclgBCoMvJpr3IZVXBRVRC3BMaXGRTuKYAyqeT6y52cZuvrvD1hNVWfO6:f5C9Jpr3I3XBRi3WaXGEKXnW6RjPkv
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (417) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-