Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

09/07/2024, 19:21

240709-x2s8ss1blj 10

09/07/2024, 19:14

240709-xxngrazhkp 10

03/07/2024, 09:01

240703-ky8g4awaja 10

Analysis

  • max time kernel
    199s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03/07/2024, 09:01

General

  • Target

    ransom.exe

  • Size

    7.8MB

  • MD5

    648bd793d9e54fc2741e0ba10980c7de

  • SHA1

    f5d0c94b2be91342dc01ecf2f89e7e6f21a74b90

  • SHA256

    102276ae1f518745695fe8f291bf6e69856b91723244881561bb1a2338d54b12

  • SHA512

    d1428b934a360d7f3651947d11081892c93c7cd29a17dc38190cbb46c95939928ac6f805adf586be2937e27fc20aec8bd1fc2c782c681e7e94e9e8d33b8ebf15

  • SSDEEP

    98304:9+v9K8MgmB4oIWcCJ3ZZVL8oYi5lTkZkmla1DXL:S4uWcCT9Gzl

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Adobe\Acrobat\9.0\CyberVolk_ReadMe.txt

Ransom Note
Greetings. All your files have been encrypted by CyberVolk ransomware. Please never try to recover your files without decryption key which I give you after pay. They could be disappeared� You should follow my words. Pay $1000 BTC to below address. My telegram : @hacker7 Our Team : https://t.me/cubervolk We always welcome you and your payment.
URLs

https://t.me/cubervolk

Signatures

  • Renames multiple (893) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 64 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ransom.exe
    "C:\Users\Admin\AppData\Local\Temp\ransom.exe"
    1⤵
    • Drops startup file
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    PID:2192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Assistance\Client\1.0\it-IT\Help_MValidator.Lck.cvenc

    Filesize

    1KB

    MD5

    ed1afbbc88b70d9df3654b5e5f3079fc

    SHA1

    8217f964acda257ba0fef9320c51907ec7320047

    SHA256

    8be93167076559024a781378ad3ca6d60887ceed6dd3005700e71c6ca9817170

    SHA512

    eed136ecc836d423a788555df03b49a01df12b4792d67eff2b881f9da74b154821b00de27fabfadfd85719d928afafa4203245e93fc032369f95cee1f51bf248

  • C:\ProgramData\Package Cache\{B175520C-86A2-35A7-8619-86DC379688B9}v11.0.61030\packages\vcRuntimeAdditional_x86\vc_runtimeAdditional_x86.msi.cvenc

    Filesize

    149KB

    MD5

    10b2f887c09a93ec7408c38c70cd0ee0

    SHA1

    e85a8a1f20da675f9d1e5c5b3db8b5b7c311bd8a

    SHA256

    28dfd1c900f2fadadf6a0a9d5ad488d571e72349feaf6c15a856a2dafb1b3aed

    SHA512

    de516ee5c6d2addf4da6cef4aaf88b691fedde9c5c9cb5b7d1fd2b2105aff8f3b50aea06c6c51a7510d2f61cd4fe363c653d1b8e14d25b244f98e9df46f104d2

  • C:\Users\Admin\AppData\Local\Adobe\Acrobat\9.0\CyberVolk_ReadMe.txt

    Filesize

    348B

    MD5

    ce7ff0a9361571a2dcb08f50500ace3f

    SHA1

    5d8bed459f55a37e2fcb801d04de337a01c5d623

    SHA256

    894bc59f5227b4d545412b2a2897367d7ac88090c86f5a1728bf733e70bd93ee

    SHA512

    bba6d46fae5b4099b047b192f7df21fdf01675b09f3da38a365710fc9aa5b126cc6a2c2547be48deecfaa360e1521cf04a9793af083735de4a8cb7be9bd4c52a

  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\CURRENT.cvenc

    Filesize

    1KB

    MD5

    7b1339db7c80b5629c34327500aa7526

    SHA1

    de1af1c78694294a87dd70de212c4c5c63473282

    SHA256

    10c208d757a5140284f42b01d3d23860b4cfb148bdfa187ef9fa0c652183d7f2

    SHA512

    b446dd78b7aea71333ea28f64c8bb8eaaff6f26cbbc70e0176a2a78aa6b5da06f83887b43600a15b048938d485a99755badb284708459b3c8c933a958300fe47

  • C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\JWM3U1DD\desktop.ini.cvenc

    Filesize

    1KB

    MD5

    69d81431cf15f0d1a37bdac6c0ef38e4

    SHA1

    654b41f5406b55e1adc5585477d95f9e27943ec1

    SHA256

    a724f47880429a1914fc2dcc1ecc14fed9b04279c51d631719e439a125ee55e5

    SHA512

    5c12f9b36c013de7132f01b3ac04cfdd64801fe2c953c19b83955a3a1b6676963476a58eb026626660e73ac7bc9941d4b953bcfa2383886a616012661f6614fd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MG62UP6H\desktop.ini.cvenc

    Filesize

    1KB

    MD5

    29d2ee2141ce5dfdbf90b40530b3d033

    SHA1

    de96ef1e5c0d78e1e19f8f2e86b56b3c4949d83c

    SHA256

    11b00ca85d2e0657a7bcf12ed823ee28b475d5e809b92069ef0b5ca4fc7949a1

    SHA512

    f86fcf3de4a8bda46a67b4c5aae44f00963e22aaae59277eb53ca6fd83253bda9601edcf98a7246d3014153d1b2063c6bf555b0866bd2f38e5be5c132bde923d