Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/08/2024, 11:53

General

  • Target

    7b0f5d34e8021af4134dbc9b5a0119f8e2acf18ade91c5f2b2fd168daec0027b.exe

  • Size

    147KB

  • MD5

    1b8977fa6d45aa48c790b038a8696b71

  • SHA1

    6c29c41ca7d413846057b6f32059ca1c714782bb

  • SHA256

    7b0f5d34e8021af4134dbc9b5a0119f8e2acf18ade91c5f2b2fd168daec0027b

  • SHA512

    189080dbc029f333251135bb702b5ecad477f9f9811c2704810e063c64b109fa8d2f5771a41fd286435d9a8ce368c352675971cd2d4d6c1191d9c2980333cebd

  • SSDEEP

    3072:1qJogYkcSNm9V7DtXJqJIw1gUQil+4O6JT:1q2kc4m9tDtXJqJIwll+

Malware Config

Extracted

Path

C:\ashOWYJUH.README.txt

Ransom Note
>>>> You need to contact us soon! Our contact email: [email protected] >>>> Your data are stolen and encrypted >>>> Your personal DECRYPTION ID: D9AC5C30CE91307B7AEA38D39FFE960C >>>> All files on your computer have been encrypted. >>>> If you want to recover encrypted files, then contact us soon! >>>> We can decrypt 1-3 files (doc, xls, pdf, txt, jpeg) for free. You can attach them to your email. Databases, archives, backups are decrypted only after payment! >>>> What guarantees that we will not deceive you? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and we will delete your data. Life is too short to be sad. Be not sad, money, it is only paper. If we do not give you decrypters, or we do not delete your data after payment, then nobody will pay us in the future. Therefore to us our reputation is very important. We attack the companies worldwide and there is no dissatisfied victim after payment. >>>> You need to contact us soon! Our contact email: [email protected] >>>> Warning! Do not DELETE or MODIFY any files, it can lead to recovery problems! >>>> Warning! If you do not pay the ransom we will attack your company repeatedly again!

Signatures

  • Renames multiple (639) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b0f5d34e8021af4134dbc9b5a0119f8e2acf18ade91c5f2b2fd168daec0027b.exe
    "C:\Users\Admin\AppData\Local\Temp\7b0f5d34e8021af4134dbc9b5a0119f8e2acf18ade91c5f2b2fd168daec0027b.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2718105630-359604950-2820636825-1000\desktop.ini

    Filesize

    129B

    MD5

    b1cb31a5c079d43ff04ebf6a182f2700

    SHA1

    3a21b20f1a167271e5a676dd3072f9a9256debd4

    SHA256

    cb568193a698a3cb0902df15fcc8f393089832ba86d9478266f6347caf919cbf

    SHA512

    763bb392f1895d0929c73e8bc2d69ffaf3db93aee19da14a9a8afdfa38663a4b88628f94832d8d804e56ae3dd33af04c402d8d4fa9379734da8b420c5ba70598

  • C:\ashOWYJUH.README.txt

    Filesize

    1KB

    MD5

    d68c67f8984234e70f7a93cc519349fd

    SHA1

    1b504a857c905575c1a5ac40163e4fc014c9850f

    SHA256

    b8327a3b71777c5c94d920c96ca6c43f53e10c91656150a82975bd13e0cfad7f

    SHA512

    0e9d3f8d83728ec84b497a74feedb7ed53b58812e4b20e30b2ef4f18a52861a56889bb2f1f9f30c2d6f0d7857cf02e0fc9a77acb365c6042ee7e3f47632f1c39

  • F:\$RECYCLE.BIN\S-1-5-21-2718105630-359604950-2820636825-1000\DDDDDDDDDDD

    Filesize

    129B

    MD5

    59de23ac7ff01d14be5f4b322d223809

    SHA1

    92adc9c83a2cbb07ca76216c8086384fc655cd41

    SHA256

    7fa2fdcf7607aa08a24ea91dee33cbfcac664a8b8c3fb0df4f25c7ad3aec97c9

    SHA512

    b60602563f23f439c94aa1e74b753e958d12c761b8f259b2368cdc8a0dc334577bde6130a4eb371a5e03ea1a4f2a640fe7652b51cefd7fa24c2dcd36adde9f16

  • memory/864-0-0x0000000003140000-0x0000000003150000-memory.dmp

    Filesize

    64KB

  • memory/864-2-0x0000000003140000-0x0000000003150000-memory.dmp

    Filesize

    64KB

  • memory/864-1-0x0000000003140000-0x0000000003150000-memory.dmp

    Filesize

    64KB