Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    123s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/06/2024, 11:20

General

  • Target

    VirusShare_41fb9932be35e9e5ea61d74f8517c748.exe

  • Size

    222KB

  • MD5

    41fb9932be35e9e5ea61d74f8517c748

  • SHA1

    69330b95b02db41a23198f164af47a151556e863

  • SHA256

    e0aea54912d5f4e793d03303151a5d83b2d9c818b5ce8fa6ea3f609a3273114e

  • SHA512

    c46c433a4cd5bd52ccf23a0d9ff705d1a8eaa123adae5b71f6f9a18a13281850af954850a074c45157dad352b0cce27b3ef6ac905d603344d3e4d86cd0b3aebc

  • SSDEEP

    6144:FiIqk2kmqtVqu1S0IaQsG8c6Ty9Av4DObk:FLqzkvBSJ+G8XySgaI

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\-!RecOveR!-wchpo++.Txt

Ransom Note
(#?0$; >/##-=." *;,!2=:+1*$9*;/ ----- (#?0$; >/##-=." *;,!2=:+1*$9*;/ (#?0$; >/##-=." *;,!2=:+1*$9*;/ ------- (#?0$; >/##-=." *;,!2=:+1*$9*;/ NOT YOUR LANGUAGE? USE https://translate.google.com What's the matter with your files? Your data was secured using a strong encryption with RSA4096. Use the link down below to find additional information on the encryption keys using RSA-4096 https://en.wikipedia.org/wiki/RSA_(cryptosystem) What exactly that means? (#?0$; >/##-=." *;,!2=:+1*$9*;/ ------- (#?0$; >/##-=." *;,!2=:+1*$9*;/ It means that on a structural level your files have been transformed . You won't be able to use , read , see or work with them anymore . In other words they are useless , however , there is a possibility to restore them with our help . What exactly happened to your files ??? *** Two personal RSA-4096 keys were generated for your PC/Laptop; one key is public, another key is private. *** All your data and files were encrypted by the means of the public key , which you received over the web . *** In order to decrypt your data and gain access to your computer you need a private key and a decryption software, which can be found on one of our secret servers. (#?0$; >/##-=." *;,!2=:+1*$9*;/ ----- (#?0$; >/##-=." *;,!2=:+1*$9*;/ What should you do next ? There are several options for you to consider : *** You can wait for a while until the price of a private key will raise, so you will have to pay twice as much to access your files or *** You can start getting BitCoins right now and get access to your data quite fast . In case you have valuable files , we advise you to act fast as there is no other option rather than paying in order to get back your data. In order to obtain specific instructions , please access your personal homepage by choosing one of the few addresses down below : http://74bfc.flubspiel.com/A68E5BBC75E03753 http://ibf4d.ukegaub.at/A68E5BBC75E03753 http://k3cxd.pileanoted.com/A68E5BBC75E03753 If you can't access your personal homepage or the addresses are not working, complete the following steps: *** Download TOR Browser - http://www.torproject.org/projects/torbrowser.html.en *** Install TOR Browser, run TOR Browser *** Insert link in the address bar: xzjvzkgjxebzreap.onion/A68E5BBC75E03753 (#?0$; >/##-=." *;,!2=:+1*$9*;/ (#?0$; >/##-=." *;,!2=:+1*$9*;/ (#?0$; >/##-=." *;,!2=:+1*$9*;/ ***************IMPORTANT*****************INFORMATION******************** Your personal homepages http://74bfc.flubspiel.com/A68E5BBC75E03753 http://ibf4d.ukegaub.at/A68E5BBC75E03753 http://k3cxd.pileanoted.com/A68E5BBC75E03753 Your personal homepage Tor-Browser xzjvzkgjxebzreap.onion/A68E5BBC75E03753 Your personal ID A68E5BBC75E03753 (#?0$; >/##-=." *;,!2=:+1*$9*;/ (#?0$; >/##-=." *;,!2=:+1*$9*;/ (#?0$; >/##-=." *;,!2=:+1*$9*;/
URLs

http://74bfc.flubspiel.com/A68E5BBC75E03753

http://ibf4d.ukegaub.at/A68E5BBC75E03753

http://k3cxd.pileanoted.com/A68E5BBC75E03753

http://xzjvzkgjxebzreap.onion/A68E5BBC75E03753

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Deletes itself 1 IoCs
  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_41fb9932be35e9e5ea61d74f8517c748.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_41fb9932be35e9e5ea61d74f8517c748.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1412
    • C:\Users\Admin\Documents\ojtsayxhjuuf.exe
      C:\Users\Admin\Documents\ojtsayxhjuuf.exe
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2204
      • C:\Windows\System32\vssadmin.exe
        "C:\Windows\System32\vssadmin.exe" Delete Shadows /For=C: /quiet
        3⤵
        • Interacts with shadow copies
        PID:2896
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\-!RecOveR!-wchpo++.Txt
        3⤵
          PID:2084
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\-!RecOveR!-wchpo++.Htm
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1632
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1740
        • C:\Windows\System32\vssadmin.exe
          "C:\Windows\System32\vssadmin.exe" Delete Shadows /For=C: /quiet
          3⤵
          • Interacts with shadow copies
          PID:2176
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\DOCUME~1\OJTSAY~1.EXE >> NUL
          3⤵
            PID:2392
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE >> NUL
          2⤵
          • Deletes itself
          PID:2884
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2524
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
        1⤵
        • Suspicious use of FindShellTrayWindow
        PID:1608

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\-!RecOveR!-wchpo++.Htm

        Filesize

        11KB

        MD5

        dd1adc5fb7c796882ff72f24bfd363c8

        SHA1

        bc2e1587f0034fa5d55706ce80f5d4d657b68461

        SHA256

        3819b2340df553df608d6f0795d427f49324030d9ce3306e49aeafd6382f185a

        SHA512

        80aadda60537384c48f8ed5ec791b6cab980ac7a29f6e561d39b30e9ab30a84cc2c8a81ed2159e3d49721e9889cb372ae01aee334d5e51bcb7aa7d9ab4db83b2

      • C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\-!RecOveR!-wchpo++.Png

        Filesize

        84KB

        MD5

        da68c38142fc95a708906f85aaa4b88d

        SHA1

        520b19f4e7a8ad3b18f2fa98d460e368db043e41

        SHA256

        f3d293053e6574ba856cfd6c653cf1a3588932cc0fb71a5eb872f551c2b57d50

        SHA512

        843c1355b7b1ddee89dfc04e3025208da5ffbcbc71934c80438ac7999cffafe9fcca470638fae4429eec55063584748930ad5fbabcf8d5f45d6549db0b55d23d

      • C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\-!RecOveR!-wchpo++.Txt

        Filesize

        2KB

        MD5

        9a67a1d9ead17b78f544f68ae7a9c229

        SHA1

        36d00bbd38007222534cd90832109b04ee33e3b6

        SHA256

        f4934e145aa37434da058ad6b9c9ca2370cb39d9326cd15aac9eb9a148b138fd

        SHA512

        0954cc1004cd9d1050b68ff0e15eea6b48b38e78a1d60fddb219986794eadfce8e7621cf97bf3a586ec0e53dbaac7f5b5a35c514cdb29dc972b6f984e9f620e8

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        fe29e0410d73ebfe532519d3171faa1b

        SHA1

        31dac12b0817bc5c6667e596f55280b8e87f264c

        SHA256

        125e32bd1d7aea75a08bdc8bf0aec1382394ba02c6851541cbf46d0ab863c19b

        SHA512

        26b5d2044e169f6d09436adba6fe56b74781faec485cd1e70eb921dae82fe978b94082ba8d063c545ff141bf04fc58b15b249ed18ff247aa295631bf830018fc

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        f5497cc24d2552dbac639a155b45888a

        SHA1

        efd8c5a68f1d6107d4e40081ce38e555e7fd3764

        SHA256

        cb97b0e51d3b0bbc5c9ba0815b10f59597cf090952ec34e65f65681b16bfb015

        SHA512

        4b3fcae646e179e8e0f6432dc6fac68984e1c155586449f3bacc23729b37efe33cbc7005b4aa2f5fb94c39b9d5841a045597d6e9f0ffce0746e4e15b16930c94

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        8a6cedbccb6fc639af1be590457dbfd3

        SHA1

        0746eadff54c0bef5dc0df24fb5ec1a70405df78

        SHA256

        d6be7cacecdb4369b9e15af40c9c8941584e3583a4bb34a2b46b826a396ba793

        SHA512

        f37b30ee82a6614083ecc752ecf1e4106313a0298bbefa43b92a7a1b09d05b1da8444ba56d891bd703883b9aac2d648cc8847db9e476ecba35619fbeecc2b1cd

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        1ebe141e5f3ce715baabdd09199be0b7

        SHA1

        a3b5266921514dcaf2c6316f30a4e718bb8af613

        SHA256

        e6a7abe046b5e127cf0dfaee4ebd7c8257d4ba58ccf4bd1c030995d2e9d24c97

        SHA512

        e527e4e3cfef41593215fe3d3cab849366eef38998c8b52633dad8231ac2db1b8cbc4feb3e1a797d7868ef79b1dc1b50ae5bb12f01c4902f5195027b8a7ebdbe

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        5835d9bddaf0e8bdbebf26a4457c10ff

        SHA1

        9cedbc613bf913177201c214b806ef5a4697e825

        SHA256

        89dcbfebe3dab046aa5f17ee877a18120b67860ca7ec339b284b047aed76830c

        SHA512

        d16957ab64e46c51361c20010711a7ebd61a13409198049358f247f6b14f1bedf5018996ba9334dcb03cbced29fa71f7a6aff2ec9a90b2fa0e0614ea819ee6dd

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        956959f8f1d4820da51126af42f83916

        SHA1

        bb3f1125805083cfa66e3d516ceb3a8bd6ed7bd6

        SHA256

        9fbf9f794aca6293278a58366a49382918c33f87ebb58d4affa84ab52dd505f9

        SHA512

        7d07f5ec83bfded0645fb2f9709b6bb74d0b18e7f0c245f2cfb2244ea1b0477d3a6de703fbe2f0631ca2f0e4c3cde86590e12b130d9fc1d757a7821ec9cb8d31

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        7b6dece270b3d924b3bed458d4744495

        SHA1

        98d2ec901bb775ddec35e07a2f0a7ecb70a92d60

        SHA256

        76e10af21330fb7717a1f17ac9503bad8bfac59ae4e1187646b6b6cb8d68d6fb

        SHA512

        dc746107f293d63356b5b3005dc80ed03b8a10321fe67316d46f59f92012dacf56c53f96ceec2075b54808f6a053ff255036bf19bd12b12314b3fd0348e5b64b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        7c8ad89d9528a255b3fd7170cbd93932

        SHA1

        364a0f133dc944bfc790b11e4cc563ccbadee85f

        SHA256

        e1a6c184a1669d4165de939d6b2b477d59a8c010942cb5c20a5b6ef2a7d46505

        SHA512

        29b4b14a3cb35a3a9b71915e3106e39eabeea028a99156a0db712f29ddcf40f81bd6220898b44775e2ed9a7281fef7c1c21826eeb045036be0d613935d719d54

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        04f437afbbfcdbc7f1482939756ce96e

        SHA1

        7b9fa30300c2837b7e2b00299d3bfc784a018a31

        SHA256

        ba859acda85cdb515d33916aea042aae8281dbf42b4655e9904a37ddf4818b4b

        SHA512

        0756ba4e53cba1a4272766a8c5dc07eaa64e3257067aec098fa53028918f3a48ee2fbb7d400d546352d7eafcad026bfcb89136a3c0355099e2a9f3452e52aaf7

      • C:\Users\Admin\AppData\Local\Temp\Cab2905.tmp

        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\Tar2DAF.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • \Users\Admin\Documents\ojtsayxhjuuf.exe

        Filesize

        222KB

        MD5

        41fb9932be35e9e5ea61d74f8517c748

        SHA1

        69330b95b02db41a23198f164af47a151556e863

        SHA256

        e0aea54912d5f4e793d03303151a5d83b2d9c818b5ce8fa6ea3f609a3273114e

        SHA512

        c46c433a4cd5bd52ccf23a0d9ff705d1a8eaa123adae5b71f6f9a18a13281850af954850a074c45157dad352b0cce27b3ef6ac905d603344d3e4d86cd0b3aebc

      • memory/1412-14-0x0000000000400000-0x0000000000489000-memory.dmp

        Filesize

        548KB

      • memory/1412-0-0x0000000000220000-0x0000000000221000-memory.dmp

        Filesize

        4KB

      • memory/1412-2-0x0000000000400000-0x0000000000489000-memory.dmp

        Filesize

        548KB

      • memory/1608-5390-0x0000000000120000-0x0000000000122000-memory.dmp

        Filesize

        8KB

      • memory/2204-494-0x0000000000400000-0x0000000000489000-memory.dmp

        Filesize

        548KB

      • memory/2204-5398-0x0000000000400000-0x0000000000489000-memory.dmp

        Filesize

        548KB

      • memory/2204-5397-0x0000000000400000-0x0000000000489000-memory.dmp

        Filesize

        548KB

      • memory/2204-5389-0x00000000028E0000-0x00000000028E2000-memory.dmp

        Filesize

        8KB

      • memory/2204-4964-0x0000000000400000-0x0000000000489000-memory.dmp

        Filesize

        548KB

      • memory/2204-4434-0x0000000000400000-0x0000000000489000-memory.dmp

        Filesize

        548KB

      • memory/2204-3769-0x0000000000400000-0x0000000000489000-memory.dmp

        Filesize

        548KB

      • memory/2204-3150-0x0000000000400000-0x0000000000489000-memory.dmp

        Filesize

        548KB

      • memory/2204-2194-0x0000000000400000-0x0000000000489000-memory.dmp

        Filesize

        548KB

      • memory/2204-1389-0x0000000000400000-0x0000000000489000-memory.dmp

        Filesize

        548KB

      • memory/2204-646-0x0000000000400000-0x0000000000489000-memory.dmp

        Filesize

        548KB