Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    04/08/2024, 11:53

General

  • Target

    7b0f5d34e8021af4134dbc9b5a0119f8e2acf18ade91c5f2b2fd168daec0027b.exe

  • Size

    147KB

  • MD5

    1b8977fa6d45aa48c790b038a8696b71

  • SHA1

    6c29c41ca7d413846057b6f32059ca1c714782bb

  • SHA256

    7b0f5d34e8021af4134dbc9b5a0119f8e2acf18ade91c5f2b2fd168daec0027b

  • SHA512

    189080dbc029f333251135bb702b5ecad477f9f9811c2704810e063c64b109fa8d2f5771a41fd286435d9a8ce368c352675971cd2d4d6c1191d9c2980333cebd

  • SSDEEP

    3072:1qJogYkcSNm9V7DtXJqJIw1gUQil+4O6JT:1q2kc4m9tDtXJqJIwll+

Malware Config

Extracted

Path

C:\ashOWYJUH.README.txt

Ransom Note
>>>> You need to contact us soon! Our contact email: [email protected] >>>> Your data are stolen and encrypted >>>> Your personal DECRYPTION ID: D9AC5C30CE91307BC45756FEC54E3A07 >>>> All files on your computer have been encrypted. >>>> If you want to recover encrypted files, then contact us soon! >>>> We can decrypt 1-3 files (doc, xls, pdf, txt, jpeg) for free. You can attach them to your email. Databases, archives, backups are decrypted only after payment! >>>> What guarantees that we will not deceive you? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and we will delete your data. Life is too short to be sad. Be not sad, money, it is only paper. If we do not give you decrypters, or we do not delete your data after payment, then nobody will pay us in the future. Therefore to us our reputation is very important. We attack the companies worldwide and there is no dissatisfied victim after payment. >>>> You need to contact us soon! Our contact email: [email protected] >>>> Warning! Do not DELETE or MODIFY any files, it can lead to recovery problems! >>>> Warning! If you do not pay the ransom we will attack your company repeatedly again!

Signatures

  • Renames multiple (638) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b0f5d34e8021af4134dbc9b5a0119f8e2acf18ade91c5f2b2fd168daec0027b.exe
    "C:\Users\Admin\AppData\Local\Temp\7b0f5d34e8021af4134dbc9b5a0119f8e2acf18ade91c5f2b2fd168daec0027b.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-970747758-134341002-3585657277-1000\BBBBBBBBBBB

    Filesize

    129B

    MD5

    5c2f58bec1aee14aff160d8f2b4ce3bc

    SHA1

    4997517bf91809989717f7fa1e53465ef522c20d

    SHA256

    4846029fc7cc90749df484c3135c14cbe6e37837037faf12aeb4de87b96ebdce

    SHA512

    1003dbe206d1a69ec43d7170238c998521bc370258df008a14cdac5ef51fe3267b3687fe37ee3b5c608db376f1087f3501506c4726cbc08f5db5feec0feed112

  • C:\ashOWYJUH.README.txt

    Filesize

    1KB

    MD5

    9b31aa43545c38071f7f397dddecb96c

    SHA1

    b48de432f6b13c575384e8684cb98b54a56e9544

    SHA256

    ff29789851b9b3df761ea1e29224bbb013d4367daccf63b4cb92d3c78a87dc58

    SHA512

    9a6b85307ba74360a584c8bc9a2adcd5c4e16fc0d6c6d11e7e04e1c8b91c4468bdbcbc4f6e5f6ebb2e386bdd6660c01db70680a08177dedc8576fffbefa3a5f8

  • F:\$RECYCLE.BIN\S-1-5-21-970747758-134341002-3585657277-1000\DDDDDDDDDDD

    Filesize

    129B

    MD5

    ba1e8a7189b47bb27084430ee0dc1b19

    SHA1

    9115a7562ca12ed5de6e3b1cae3263f6896385de

    SHA256

    8644ffaa6c9ebf07094352f052b81aceb240ae069e1f25f5eb72c74a6a7c962d

    SHA512

    7e8a5b2f730f4cb8e8629a2658ce917d672d6404f30b5c9794f82c9118e1051d0c7339f1dc812b67f6b6c958ad97df9c70b3fdfc02b815db2cf50c8718ebcf56

  • memory/3924-0-0x00000000008D0000-0x00000000008E0000-memory.dmp

    Filesize

    64KB

  • memory/3924-1-0x00000000008D0000-0x00000000008E0000-memory.dmp

    Filesize

    64KB

  • memory/3924-2-0x00000000008D0000-0x00000000008E0000-memory.dmp

    Filesize

    64KB