Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
275d0d15fa3582e848f05daa76d351e10ce3d7072e9c987eee1a1f606c714a97.zip
-
Size
46KB
-
Sample
240705-g9jfkawfnc
-
MD5
4ba0d6c24563460828aaec7878d5b137
-
SHA1
97f5833d72499a6a0c4860ad127a7dabc9c64e00
-
SHA256
dbfbc98581c82723ed3c35b156ef0924fad11271e0c3c6c6b8447e7e02b05a5d
-
SHA512
ef275a477116473c6622ab80dbc8c41dee152b43b79641cd16dde0f53b1413cfee42748769ef3b3fb380f5dc2b36f57d6f9153ea407c41a2f67b6418b52a5f90
-
SSDEEP
768:NLpRbgdO/5VFJ2zU9EA+kzkVreP3m9AHUVUdJzzZohahucHTCn:/REOZNQFef06dxa0ASTA
Static task
static1
Behavioral task
behavioral1
Sample
275d0d15fa3582e848f05daa76d351e10ce3d7072e9c987eee1a1f606c714a97.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
275d0d15fa3582e848f05daa76d351e10ce3d7072e9c987eee1a1f606c714a97.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\Users\Admin\Desktop\README.hta
Targets
-
-
Target
275d0d15fa3582e848f05daa76d351e10ce3d7072e9c987eee1a1f606c714a97
-
Size
49KB
-
MD5
c2734e516454c7af7354a7a4d25cdfa1
-
SHA1
ad062ffc6cc642ed47549f172e085c15e4902466
-
SHA256
275d0d15fa3582e848f05daa76d351e10ce3d7072e9c987eee1a1f606c714a97
-
SHA512
dc32973cbe1b12f27c9d78702f8efb307f48f521529d0ad4cd70426bfcacb697a3dd761246cc7bd40235c51d7b1bced2eeee78bd7ac82ad297c314a80d753367
-
SSDEEP
1536:dQFgpLzLiugEBVw9wrLM+7UUjl0FSrXaN:CF4zLi9EBpg+3XaN
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (173) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-