Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16/09/2024, 08:47
Behavioral task
behavioral1
Sample
Ransom.Win32.Tescrypt.exe
Resource
win7-20240903-en
General
-
Target
Ransom.Win32.Tescrypt.exe
-
Size
80KB
-
MD5
e4810c25939a78d1479e52720a25b830
-
SHA1
83fcc85e65f96989b6602f59273697e4bcfe7114
-
SHA256
f4639330a7f3a905bc5faa07eee325f5d9dee6ef4e96e05eeff8e91682d3b43b
-
SHA512
cc637e01a5a53baeb4909057347349687a0ff999f88c71a20b5263190ee341623ef78c22123aa3d988e06ae39a8c3ab73273b40bd81b4efbb2c35763437aa002
-
SSDEEP
1536:EYPSyyHrcrpFPgzy7yCqF47UV1Hi8yBiweQKIIXIAZB0CmuJd4BXL:EMSyyLuFoLCqCm1C8yBijpBbd45
Malware Config
Extracted
gozi
Signatures
-
Deletes itself 1 IoCs
pid Process 5112 Ransom.Win32.Tescrypt.exe -
Executes dropped EXE 1 IoCs
pid Process 5112 Ransom.Win32.Tescrypt.exe -
resource yara_rule behavioral2/memory/752-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/5112-12-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x00090000000233f4-11.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ransom.Win32.Tescrypt.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 752 Ransom.Win32.Tescrypt.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 752 Ransom.Win32.Tescrypt.exe 5112 Ransom.Win32.Tescrypt.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 752 wrote to memory of 5112 752 Ransom.Win32.Tescrypt.exe 83 PID 752 wrote to memory of 5112 752 Ransom.Win32.Tescrypt.exe 83 PID 752 wrote to memory of 5112 752 Ransom.Win32.Tescrypt.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ransom.Win32.Tescrypt.exe"C:\Users\Admin\AppData\Local\Temp\Ransom.Win32.Tescrypt.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\Ransom.Win32.Tescrypt.exeC:\Users\Admin\AppData\Local\Temp\Ransom.Win32.Tescrypt.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD569929d6076e93ae50739d3ced66b4c37
SHA1f59aec5d5ea87a09f6103d2ccd1c912266897864
SHA256366c7028b18160c06bc3b9fc273551ed7fb2804f0ab1baa99167d261553a210d
SHA5125598d24fe26a7469360a2d699c18907d18c7e114c43d64dd5df62bb5646a6f4f633d8d535c5fa9865d0730139df236f5ad841fc02ac9dd926cda45da9c21e824