Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
29s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/09/2024, 08:47
Behavioral task
behavioral1
Sample
Ransom.Win32.Tescrypt.exe
Resource
win7-20240903-en
General
-
Target
Ransom.Win32.Tescrypt.exe
-
Size
80KB
-
MD5
e4810c25939a78d1479e52720a25b830
-
SHA1
83fcc85e65f96989b6602f59273697e4bcfe7114
-
SHA256
f4639330a7f3a905bc5faa07eee325f5d9dee6ef4e96e05eeff8e91682d3b43b
-
SHA512
cc637e01a5a53baeb4909057347349687a0ff999f88c71a20b5263190ee341623ef78c22123aa3d988e06ae39a8c3ab73273b40bd81b4efbb2c35763437aa002
-
SSDEEP
1536:EYPSyyHrcrpFPgzy7yCqF47UV1Hi8yBiweQKIIXIAZB0CmuJd4BXL:EMSyyLuFoLCqCm1C8yBijpBbd45
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3044 Ransom.Win32.Tescrypt.exe -
Executes dropped EXE 1 IoCs
pid Process 3044 Ransom.Win32.Tescrypt.exe -
Loads dropped DLL 1 IoCs
pid Process 1860 Ransom.Win32.Tescrypt.exe -
resource yara_rule behavioral1/memory/1860-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/1860-12-0x0000000000310000-0x000000000034A000-memory.dmp upx behavioral1/files/0x000a00000001225c-10.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ransom.Win32.Tescrypt.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1860 Ransom.Win32.Tescrypt.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1860 Ransom.Win32.Tescrypt.exe 3044 Ransom.Win32.Tescrypt.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1860 wrote to memory of 3044 1860 Ransom.Win32.Tescrypt.exe 29 PID 1860 wrote to memory of 3044 1860 Ransom.Win32.Tescrypt.exe 29 PID 1860 wrote to memory of 3044 1860 Ransom.Win32.Tescrypt.exe 29 PID 1860 wrote to memory of 3044 1860 Ransom.Win32.Tescrypt.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ransom.Win32.Tescrypt.exe"C:\Users\Admin\AppData\Local\Temp\Ransom.Win32.Tescrypt.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\Ransom.Win32.Tescrypt.exeC:\Users\Admin\AppData\Local\Temp\Ransom.Win32.Tescrypt.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5818862a63675792be9e27b6421c2386f
SHA142f191bd3bfaebe585fc2b1cdc9f7add94b60f82
SHA256724bd0ddf58b27a50b087b4fdcdc99c21ce1ef521b898b6ad6cca65c191b805a
SHA512e66bc66467abddd2f0f60c201cc9e3f08055116fc6d77895f22015263375a1de0573fbd249ebb086ba835baab9c7f08edf040a48ae04803f4afbd8e4f9cb882b