Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/07/2024, 01:16

General

  • Target

    9308ea3ebaf4d39f8cb5f29b015cf0064f73170d61226a5f9b5b7c28173bc402.exe

  • Size

    7.0MB

  • MD5

    2e74557d1ac847575f10650b8dd13276

  • SHA1

    0e937f3b1a770bbc4fd28cdf330d9b217ab34062

  • SHA256

    9308ea3ebaf4d39f8cb5f29b015cf0064f73170d61226a5f9b5b7c28173bc402

  • SHA512

    fe2651014bc17cf37b1f947e25b898f0c9ee35a2b2fcfe3d247b43854c4430dabc372f16eff03c1eb7f16d0a2c55778d209020023042e4715b8f6fbaf8493692

  • SSDEEP

    98304:6K8JmgV5fPcYE+/3q+PO0b+ISWAR66ga2v8j:6MgV5f4aiPISWAVgp

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\ReadMe.txt

Ransom Note
=== README === Greet citizen of the world. Your files have been encrypted by the NetForceZ's Ransomware. Your documents, photos, databases, and other important files have been encrypted with the strongest encryption and a unique key. The files are no longer usable as they have been encrypted. You cannot recover them without our help. To restore your files, you need to purchase a special decryption key. The price for the key is $500 USDT ERC20 on Ethereum Network. To buy the decryption program, you need to do the following: Your ID : 1. Create an account on Coinbase or Binance to buy $500 USDT ERC20 on Ethereum Network. 2. Install a USDT ERC20 on Ethereum Network Wallet like Exodus. 3. Send USDT ERC20 on Ethereum Network to us : Once you have USDT ERC20 on Ethereum Network in your Wallet, you must send the required amount to our USDT ERC20 on Ethereum Network address. 4. Confirm Payment : Notify us through Telegram with the transaction ID. After we confirm your payment, we will send you the decryption key. Warning: * Do not try to decrypt your files using third-party software; this may cause permanent data loss. * Do not rename the encrypted files or try to modify them in any way; this will prevent you from being able to decrypt them. * If you do not pay within 10 hours, your files will be permanently deleted. If you need proof that we can decrypt your files, you can contact us and decrypt one file for free. Contact us on Telegram at: @xpolarized | @ZZART3XX Contact us on Tox at : 498F8B96D058FEB29A315C4572117E753F471847AFDF37E0A9896F6FFA5530547680628F8134 Our USDT ERC20 on Ethereum Network address : 0xdF0f41d46Dd8Be583F9a69b4a85A600C8Af7f4Ad Remember, we are the only ones who can help you recover your files. === END OF README ===

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9308ea3ebaf4d39f8cb5f29b015cf0064f73170d61226a5f9b5b7c28173bc402.exe
    "C:\Users\Admin\AppData\Local\Temp\9308ea3ebaf4d39f8cb5f29b015cf0064f73170d61226a5f9b5b7c28173bc402.exe"
    1⤵
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:372
    • C:\Windows\system32\cmd.exe
      cmd /c start C:\Users\Admin\Desktop\ReadMe.txt
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4412
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\ReadMe.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        • Suspicious use of FindShellTrayWindow
        PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\ReadMe.txt

    Filesize

    1KB

    MD5

    d42e29cb5b5ef3309d5818aa187a2d20

    SHA1

    a2b705a50398b24ecd6ae00e6558cdfc909e90a6

    SHA256

    5669dfeacd78d2e6c88c8b04c21215b9dd07fa197c3f03bea615a56552ddc415

    SHA512

    a1b51f47b48e9448a54e5e6a8dee5a08f552328ab2490d65a9435f62db280f9e630cc1c44788bc31dad9e4cd83ea93147b15f984cb5758bee76883fcaa90aaba