Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
09/07/2024, 19:21
240709-x2s8ss1blj 1009/07/2024, 19:14
240709-xxngrazhkp 1003/07/2024, 09:01
240703-ky8g4awaja 10Analysis
-
max time kernel
299s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
ransom.exe
Resource
win7-20240708-en
General
-
Target
ransom.exe
-
Size
7.8MB
-
MD5
648bd793d9e54fc2741e0ba10980c7de
-
SHA1
f5d0c94b2be91342dc01ecf2f89e7e6f21a74b90
-
SHA256
102276ae1f518745695fe8f291bf6e69856b91723244881561bb1a2338d54b12
-
SHA512
d1428b934a360d7f3651947d11081892c93c7cd29a17dc38190cbb46c95939928ac6f805adf586be2937e27fc20aec8bd1fc2c782c681e7e94e9e8d33b8ebf15
-
SSDEEP
98304:9+v9K8MgmB4oIWcCJ3ZZVL8oYi5lTkZkmla1DXL:S4uWcCT9Gzl
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Adobe\Acrobat\9.0\CyberVolk_ReadMe.txt
https://t.me/cubervolk
Signatures
-
Renames multiple (885) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\CyberVolk_ReadMe.txt ransom.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini ransom.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.cvenc ransom.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CyberVolk_ReadMe.txt ransom.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\CyberVolk_ReadMe.txt ransom.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CyberVolk_ReadMe.txt ransom.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M720ATCO\desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\ZO1X14N3\desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini ransom.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini ransom.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Ringtones\desktop.ini ransom.exe File opened for modification C:\Users\Public\Pictures\desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\C906A748\desktop.ini ransom.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini ransom.exe File opened for modification C:\Users\Admin\Music\desktop.ini ransom.exe File opened for modification C:\Users\Admin\Videos\desktop.ini ransom.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini ransom.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini ransom.exe File opened for modification C:\Users\Public\desktop.ini ransom.exe File opened for modification C:\Users\Public\Libraries\desktop.ini ransom.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini ransom.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini ransom.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini ransom.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini ransom.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini ransom.exe File opened for modification C:\Users\Public\Music\desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini ransom.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini ransom.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini ransom.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OW9ZQM06\desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini ransom.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini ransom.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\desktop.ini ransom.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\N7ZQRMOO\desktop.ini ransom.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini ransom.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini ransom.exe File opened for modification C:\Users\Public\Documents\desktop.ini ransom.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini ransom.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\desktop.ini ransom.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini ransom.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini ransom.exe File opened for modification C:\Users\Public\Downloads\desktop.ini ransom.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\MN6S8FGK\desktop.ini ransom.exe File opened for modification C:\Users\Admin\Links\desktop.ini ransom.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0JY8H21Z\desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini ransom.exe File opened for modification C:\Users\Public\Desktop\desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\V8SGIH7I\desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini ransom.exe File opened for modification C:\Users\Admin\Searches\desktop.ini ransom.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini ransom.exe File opened for modification C:\Users\Public\Videos\desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini ransom.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini ransom.exe File opened for modification C:\Users\Admin\Documents\desktop.ini ransom.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\g: ransom.exe File opened (read-only) \??\l: ransom.exe File opened (read-only) \??\x: ransom.exe File opened (read-only) \??\z: ransom.exe File opened (read-only) \??\a: ransom.exe File opened (read-only) \??\j: ransom.exe File opened (read-only) \??\m: ransom.exe File opened (read-only) \??\n: ransom.exe File opened (read-only) \??\p: ransom.exe File opened (read-only) \??\s: ransom.exe File opened (read-only) \??\y: ransom.exe File opened (read-only) \??\b: ransom.exe File opened (read-only) \??\e: ransom.exe File opened (read-only) \??\h: ransom.exe File opened (read-only) \??\k: ransom.exe File opened (read-only) \??\o: ransom.exe File opened (read-only) \??\q: ransom.exe File opened (read-only) \??\u: ransom.exe File opened (read-only) \??\i: ransom.exe File opened (read-only) \??\r: ransom.exe File opened (read-only) \??\t: ransom.exe File opened (read-only) \??\v: ransom.exe File opened (read-only) \??\w: ransom.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\tmp.bmp" ransom.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 ransom.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Package Cache\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\packages\vcRuntimeMinimum_amd64\vc_runtimeMinimum_x64.msi.cvenc
Filesize141KB
MD5f6971c10458fdbed483225cb43b4895e
SHA1b843792607027c7cd9430ff118f92072b4f7e00f
SHA2564ccba67fa65a2b5e1ffee080b08fc0e55750415eea494204426ab2fa11bc018c
SHA512fb848f760f9f8a962f7648bbc66a8b4a58113d35470c94cc39a030d77549b05446139e1132e4250a4b77fe13a885a6e2832e9419d09572593579ee4b18b6a9f0
-
Filesize
348B
MD5ce7ff0a9361571a2dcb08f50500ace3f
SHA15d8bed459f55a37e2fcb801d04de337a01c5d623
SHA256894bc59f5227b4d545412b2a2897367d7ac88090c86f5a1728bf733e70bd93ee
SHA512bba6d46fae5b4099b047b192f7df21fdf01675b09f3da38a365710fc9aa5b126cc6a2c2547be48deecfaa360e1521cf04a9793af083735de4a8cb7be9bd4c52a
-
Filesize
1KB
MD54cefe7b1001dd855a61d2b04b22c82c7
SHA1e7c3606dd258954215a3a8ac55cba286185aa824
SHA2560ed75905c1476df560cf3bc6cf820fe76b93b93c17f8507b14920714f5b54e98
SHA51286eb672d257636cea07b8cd9c2ad1df009796e86f7f6a48010a4e0f53196619c8a6c9a0afea3730b471d0cac3ad7b3497654dac58756aad1f23afdaa47841315
-
Filesize
1KB
MD507f32670a0e2f51dcdc2dffbfa500b80
SHA100ff404e8c348919febdfdf89fdf7c18518114d1
SHA25640e48200832bdb1daa306220c94052635497317256db1a0e24ef0d5271c19008
SHA512b435041ff9be33f85c085ef1203dcab6be970dacaee6f42138a4f35e0b2a29bfb7bba4ba9f5def046820a5fd09afc76c2f35a454984ae29063029895712977a6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\V8SGIH7I\desktop.ini.cvenc
Filesize1KB
MD5f34406dd4dfa511f524c5f5840ccb133
SHA1eaf3a3f794116b16a83971db9aed755fd35ccfe6
SHA25685a269985763a0d4ef4fd146b789ccaf453bd3c525f281cf458d2edb1cc2fb8c
SHA512c125bf3b64893d39ff6c14003a9144a080bc0e8a461b09f2dcb12d8310a929f9d80c6de6c231b00fb14ac462d77522225f74b28be7b34101c0f2fedb3a435242
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nyws1jjf.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite.cvenc
Filesize49KB
MD5de67e1233652206a657610545ac78e1f
SHA18e0ac01bb939d6669814742c2589c9da742c063f
SHA256d0ddba52a934a9eabf58a67f5256940f061c38c0904bd1d8568779032719c2c0
SHA512b2704fed19dd6734c543ad9b1220f99cd0a846cc75f35e5441877f767f2a63205c918a4bd5714b97f5b3bb5d514398cfbf4968ea5089229da3c3017106417568
-
Filesize
5B
MD5e36c72761b575374e7d7e63a0333d93f
SHA101b61b9ddd5632f78edb1bc40fdfa6d6aada083f
SHA2562fa8eba4e72866823c3e963389d1d3a58d1bf10b6bb427b384b914a3629af429
SHA51212e4fad54c218b0cc59fc1643ef6af1c8c08a74a05f89fc10c9cea53969aad214711086578efa1922c72bdf375cb5753a97fd98bf9bcebd86190a6e9b7b44550
-
Filesize
5B
MD5777066aaeea6e03fbb578ac132b6bf02
SHA170e80e691f225404bc21a65e319bf6a1d17985f3
SHA2567e93bf8ba9708c55865983f7a83a39ac766ee84bccbb1df4d9f9a37e7b3bdb43
SHA512aa050b12122bf0b0fd2d8282dd70cf83579e00f2afb2df78bef719ded707a9aeb920184f72635b64e79a7cecee6228eadba8a216264f05239689f89ec2a5285a
-
Filesize
5B
MD57bf023ca6853abd395cab03f83945d24
SHA1d3aa95e00bcefca65d121709dddb12c213b32fc1
SHA2565a703f620dbab029a3ac801c3fc85ef4327a5f0a751b852f650bf14b9b44459b
SHA512653e70bfdb9cb9b69d577710c09032bd2a9658d0e23cba214970232f6a6cc0538b54d0b946c026cf2af87a12672d6d65074d6fc196778aac828ec57f1c88b03a
-
Filesize
5B
MD5eb1e4e49423bf446d9ccc99322523f3c
SHA13c3f26da7acdc9f46c1ba1a716c3847260ec6db0
SHA256d74ad8f7c64819b319003126f9a7d68263aff159db0388c359cfbfb46e263e96
SHA5120c2fc49510cf5204b214c9c956f521ba25fdb99a807a7a04877bd80753bc95adff73a3aca81ad8396055720328411b5029ccf211ab29753d67458e533eecc272
-
Filesize
10KB
MD5e867aff6f39632e4608ed3dc2097b372
SHA16b0f8f8c51c2d4d3c466029053062b4935bde730
SHA256c41fc5fcb654e05a8073b4bd95503275ec7edbb35a60da99d780e65f90e5babc
SHA512c840cb1e8eb7ed0498138509b432454f236fc783c1044d42c54420e7893b687fc25b69f4ab99bc473b3624a68381f00f6a1a4c7fb4ac22adcf0cd29d294db135