Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

09/07/2024, 19:21

240709-x2s8ss1blj 10

09/07/2024, 19:14

240709-xxngrazhkp 10

03/07/2024, 09:01

240703-ky8g4awaja 10

Analysis

  • max time kernel
    299s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 19:21

General

  • Target

    ransom.exe

  • Size

    7.8MB

  • MD5

    648bd793d9e54fc2741e0ba10980c7de

  • SHA1

    f5d0c94b2be91342dc01ecf2f89e7e6f21a74b90

  • SHA256

    102276ae1f518745695fe8f291bf6e69856b91723244881561bb1a2338d54b12

  • SHA512

    d1428b934a360d7f3651947d11081892c93c7cd29a17dc38190cbb46c95939928ac6f805adf586be2937e27fc20aec8bd1fc2c782c681e7e94e9e8d33b8ebf15

  • SSDEEP

    98304:9+v9K8MgmB4oIWcCJ3ZZVL8oYi5lTkZkmla1DXL:S4uWcCT9Gzl

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Adobe\Acrobat\9.0\CyberVolk_ReadMe.txt

Ransom Note
Greetings. All your files have been encrypted by CyberVolk ransomware. Please never try to recover your files without decryption key which I give you after pay. They could be disappeared� You should follow my words. Pay $1000 BTC to below address. My telegram : @hacker7 Our Team : https://t.me/cubervolk We always welcome you and your payment.
URLs

https://t.me/cubervolk

Signatures

  • Renames multiple (885) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 64 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ransom.exe
    "C:\Users\Admin\AppData\Local\Temp\ransom.exe"
    1⤵
    • Drops startup file
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Suspicious use of FindShellTrayWindow
    PID:3032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Package Cache\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\packages\vcRuntimeMinimum_amd64\vc_runtimeMinimum_x64.msi.cvenc

    Filesize

    141KB

    MD5

    f6971c10458fdbed483225cb43b4895e

    SHA1

    b843792607027c7cd9430ff118f92072b4f7e00f

    SHA256

    4ccba67fa65a2b5e1ffee080b08fc0e55750415eea494204426ab2fa11bc018c

    SHA512

    fb848f760f9f8a962f7648bbc66a8b4a58113d35470c94cc39a030d77549b05446139e1132e4250a4b77fe13a885a6e2832e9419d09572593579ee4b18b6a9f0

  • C:\Users\Admin\AppData\Local\Adobe\Acrobat\9.0\CyberVolk_ReadMe.txt

    Filesize

    348B

    MD5

    ce7ff0a9361571a2dcb08f50500ace3f

    SHA1

    5d8bed459f55a37e2fcb801d04de337a01c5d623

    SHA256

    894bc59f5227b4d545412b2a2897367d7ac88090c86f5a1728bf733e70bd93ee

    SHA512

    bba6d46fae5b4099b047b192f7df21fdf01675b09f3da38a365710fc9aa5b126cc6a2c2547be48deecfaa360e1521cf04a9793af083735de4a8cb7be9bd4c52a

  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\CURRENT.cvenc

    Filesize

    1KB

    MD5

    4cefe7b1001dd855a61d2b04b22c82c7

    SHA1

    e7c3606dd258954215a3a8ac55cba286185aa824

    SHA256

    0ed75905c1476df560cf3bc6cf820fe76b93b93c17f8507b14920714f5b54e98

    SHA512

    86eb672d257636cea07b8cd9c2ad1df009796e86f7f6a48010a4e0f53196619c8a6c9a0afea3730b471d0cac3ad7b3497654dac58756aad1f23afdaa47841315

  • C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\ZO1X14N3\desktop.ini.cvenc

    Filesize

    1KB

    MD5

    07f32670a0e2f51dcdc2dffbfa500b80

    SHA1

    00ff404e8c348919febdfdf89fdf7c18518114d1

    SHA256

    40e48200832bdb1daa306220c94052635497317256db1a0e24ef0d5271c19008

    SHA512

    b435041ff9be33f85c085ef1203dcab6be970dacaee6f42138a4f35e0b2a29bfb7bba4ba9f5def046820a5fd09afc76c2f35a454984ae29063029895712977a6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\V8SGIH7I\desktop.ini.cvenc

    Filesize

    1KB

    MD5

    f34406dd4dfa511f524c5f5840ccb133

    SHA1

    eaf3a3f794116b16a83971db9aed755fd35ccfe6

    SHA256

    85a269985763a0d4ef4fd146b789ccaf453bd3c525f281cf458d2edb1cc2fb8c

    SHA512

    c125bf3b64893d39ff6c14003a9144a080bc0e8a461b09f2dcb12d8310a929f9d80c6de6c231b00fb14ac462d77522225f74b28be7b34101c0f2fedb3a435242

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nyws1jjf.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite.cvenc

    Filesize

    49KB

    MD5

    de67e1233652206a657610545ac78e1f

    SHA1

    8e0ac01bb939d6669814742c2589c9da742c063f

    SHA256

    d0ddba52a934a9eabf58a67f5256940f061c38c0904bd1d8568779032719c2c0

    SHA512

    b2704fed19dd6734c543ad9b1220f99cd0a846cc75f35e5441877f767f2a63205c918a4bd5714b97f5b3bb5d514398cfbf4968ea5089229da3c3017106417568

  • C:\Users\Admin\AppData\Roaming\time.dat

    Filesize

    5B

    MD5

    e36c72761b575374e7d7e63a0333d93f

    SHA1

    01b61b9ddd5632f78edb1bc40fdfa6d6aada083f

    SHA256

    2fa8eba4e72866823c3e963389d1d3a58d1bf10b6bb427b384b914a3629af429

    SHA512

    12e4fad54c218b0cc59fc1643ef6af1c8c08a74a05f89fc10c9cea53969aad214711086578efa1922c72bdf375cb5753a97fd98bf9bcebd86190a6e9b7b44550

  • C:\Users\Admin\AppData\Roaming\time.dat

    Filesize

    5B

    MD5

    777066aaeea6e03fbb578ac132b6bf02

    SHA1

    70e80e691f225404bc21a65e319bf6a1d17985f3

    SHA256

    7e93bf8ba9708c55865983f7a83a39ac766ee84bccbb1df4d9f9a37e7b3bdb43

    SHA512

    aa050b12122bf0b0fd2d8282dd70cf83579e00f2afb2df78bef719ded707a9aeb920184f72635b64e79a7cecee6228eadba8a216264f05239689f89ec2a5285a

  • C:\Users\Admin\AppData\Roaming\time.dat

    Filesize

    5B

    MD5

    7bf023ca6853abd395cab03f83945d24

    SHA1

    d3aa95e00bcefca65d121709dddb12c213b32fc1

    SHA256

    5a703f620dbab029a3ac801c3fc85ef4327a5f0a751b852f650bf14b9b44459b

    SHA512

    653e70bfdb9cb9b69d577710c09032bd2a9658d0e23cba214970232f6a6cc0538b54d0b946c026cf2af87a12672d6d65074d6fc196778aac828ec57f1c88b03a

  • C:\Users\Admin\AppData\Roaming\time.dat

    Filesize

    5B

    MD5

    eb1e4e49423bf446d9ccc99322523f3c

    SHA1

    3c3f26da7acdc9f46c1ba1a716c3847260ec6db0

    SHA256

    d74ad8f7c64819b319003126f9a7d68263aff159db0388c359cfbfb46e263e96

    SHA512

    0c2fc49510cf5204b214c9c956f521ba25fdb99a807a7a04877bd80753bc95adff73a3aca81ad8396055720328411b5029ccf211ab29753d67458e533eecc272

  • C:\Users\Admin\Documents\UnregisterDebug.xlsx.cvenc

    Filesize

    10KB

    MD5

    e867aff6f39632e4608ed3dc2097b372

    SHA1

    6b0f8f8c51c2d4d3c466029053062b4935bde730

    SHA256

    c41fc5fcb654e05a8073b4bd95503275ec7edbb35a60da99d780e65f90e5babc

    SHA512

    c840cb1e8eb7ed0498138509b432454f236fc783c1044d42c54420e7893b687fc25b69f4ab99bc473b3624a68381f00f6a1a4c7fb4ac22adcf0cd29d294db135