Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26/11/2024, 19:35
Static task
static1
Behavioral task
behavioral1
Sample
Factuur4388.PDF.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Factuur4388.PDF.exe
Resource
win10v2004-20241007-en
General
-
Target
Factuur4388.PDF.exe
-
Size
772KB
-
MD5
95f60b5b36d63307d83e3f3de9675a1d
-
SHA1
da733991d9618b3a3bb5cc503ba0e860f1e8ea29
-
SHA256
f9ae18f90c502fc22c826eb8322a907fa6ddd2b38fdc1b10353d123b8910e674
-
SHA512
de63bb1117043ee0a7fb478c4a2ba3d283d7f3d71f39fdbe357d2aa403f8f4a4e7eafe53595794ef99c35156aedd3854ba2e015b259af573492e90c96e3f34ff
-
SSDEEP
12288:6sFxcCZxPEWJNy93q0DWm9+X6MSUJKzR9wz2U7qdyys2he3gxNMlKglt8RsrtUvy:bHP7gqXpKGNehe3x3r8CU
Malware Config
Extracted
C:\ProgramData\eevbedb.html
http://jssestaew3e7ao3q.onion.cab
http://jssestaew3e7ao3q.tor2web.org
http://jssestaew3e7ao3q.onion
Signatures
-
CTB-Locker
Ransomware family which uses Tor to hide its C2 communications.
-
Ctblocker family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\Geo\Nation zgczike.exe -
Executes dropped EXE 4 IoCs
pid Process 2920 zgczike.exe 2224 zgczike.exe 2008 zgczike.exe 1952 zgczike.exe -
Loads dropped DLL 1 IoCs
pid Process 2920 zgczike.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini svchost.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-18\desktop.ini svchost.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: svchost.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\x\system.pif zgczike.exe File created C:\Windows\SysWOW64\x\system.pif zgczike.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat zgczike.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Documents\\!Decrypt-All-Files-tsfrxik.bmp" Explorer.EXE -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2132 set thread context of 2860 2132 Factuur4388.PDF.exe 30 PID 2920 set thread context of 2224 2920 zgczike.exe 33 PID 2008 set thread context of 1952 2008 zgczike.exe 38 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-tsfrxik.txt svchost.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-tsfrxik.bmp svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zgczike.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zgczike.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Factuur4388.PDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zgczike.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zgczike.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 584 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main zgczike.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch zgczike.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" zgczike.exe -
Modifies data under HKEY_USERS 22 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WallpaperStyle = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{dc104d84-871d-11ef-a958-806e6f6e6963} svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\ = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Empty = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\TileWallpaper = "0" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{dc104d84-871d-11ef-a958-806e6f6e6963}\MaxCapacity = "14116" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{dc104d84-871d-11ef-a958-806e6f6e6963}\NukeOnDelete = "0" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{d292f661-86e8-11ef-9be6-f2bd923ec178}\MaxCapacity = "2047" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\LastEnum = 30002c007b00640063003100300034006400380034002d0038003700310064002d0031003100650066002d0061003900350038002d003800300036006500360066003600650036003900360033007d00000030002c007b00640032003900320066003600360031002d0038003600650038002d0031003100650066002d0039006200650036002d006600320062006400390032003300650063003100370038007d0000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{d292f661-86e8-11ef-9be6-f2bd923ec178}\NukeOnDelete = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Full = "%SystemRoot%\\System32\\imageres.dll,-54" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{d292f661-86e8-11ef-9be6-f2bd923ec178} svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows svchost.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2132 Factuur4388.PDF.exe 2860 Factuur4388.PDF.exe 2920 zgczike.exe 2224 zgczike.exe 2224 zgczike.exe 2224 zgczike.exe 2224 zgczike.exe 2008 zgczike.exe 1952 zgczike.exe 1952 zgczike.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2224 zgczike.exe Token: SeDebugPrivilege 2224 zgczike.exe Token: SeShutdownPrivilege 1344 Explorer.EXE Token: 33 2248 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2248 AUDIODG.EXE Token: 33 2248 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2248 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 zgczike.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1952 zgczike.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2132 Factuur4388.PDF.exe 2920 zgczike.exe 2008 zgczike.exe 1952 zgczike.exe 1952 zgczike.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1344 Explorer.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2860 2132 Factuur4388.PDF.exe 30 PID 2132 wrote to memory of 2860 2132 Factuur4388.PDF.exe 30 PID 2132 wrote to memory of 2860 2132 Factuur4388.PDF.exe 30 PID 2132 wrote to memory of 2860 2132 Factuur4388.PDF.exe 30 PID 2132 wrote to memory of 2860 2132 Factuur4388.PDF.exe 30 PID 2132 wrote to memory of 2860 2132 Factuur4388.PDF.exe 30 PID 2132 wrote to memory of 2860 2132 Factuur4388.PDF.exe 30 PID 2132 wrote to memory of 2860 2132 Factuur4388.PDF.exe 30 PID 3040 wrote to memory of 2920 3040 taskeng.exe 32 PID 3040 wrote to memory of 2920 3040 taskeng.exe 32 PID 3040 wrote to memory of 2920 3040 taskeng.exe 32 PID 3040 wrote to memory of 2920 3040 taskeng.exe 32 PID 2920 wrote to memory of 2224 2920 zgczike.exe 33 PID 2920 wrote to memory of 2224 2920 zgczike.exe 33 PID 2920 wrote to memory of 2224 2920 zgczike.exe 33 PID 2920 wrote to memory of 2224 2920 zgczike.exe 33 PID 2920 wrote to memory of 2224 2920 zgczike.exe 33 PID 2920 wrote to memory of 2224 2920 zgczike.exe 33 PID 2920 wrote to memory of 2224 2920 zgczike.exe 33 PID 2920 wrote to memory of 2224 2920 zgczike.exe 33 PID 2224 wrote to memory of 600 2224 zgczike.exe 9 PID 600 wrote to memory of 2892 600 svchost.exe 34 PID 600 wrote to memory of 2892 600 svchost.exe 34 PID 600 wrote to memory of 2892 600 svchost.exe 34 PID 2224 wrote to memory of 1344 2224 zgczike.exe 21 PID 2224 wrote to memory of 584 2224 zgczike.exe 35 PID 2224 wrote to memory of 584 2224 zgczike.exe 35 PID 2224 wrote to memory of 584 2224 zgczike.exe 35 PID 2224 wrote to memory of 584 2224 zgczike.exe 35 PID 2224 wrote to memory of 2008 2224 zgczike.exe 37 PID 2224 wrote to memory of 2008 2224 zgczike.exe 37 PID 2224 wrote to memory of 2008 2224 zgczike.exe 37 PID 2224 wrote to memory of 2008 2224 zgczike.exe 37 PID 2008 wrote to memory of 1952 2008 zgczike.exe 38 PID 2008 wrote to memory of 1952 2008 zgczike.exe 38 PID 2008 wrote to memory of 1952 2008 zgczike.exe 38 PID 2008 wrote to memory of 1952 2008 zgczike.exe 38 PID 2008 wrote to memory of 1952 2008 zgczike.exe 38 PID 2008 wrote to memory of 1952 2008 zgczike.exe 38 PID 2008 wrote to memory of 1952 2008 zgczike.exe 38 PID 2008 wrote to memory of 1952 2008 zgczike.exe 38 PID 600 wrote to memory of 2888 600 svchost.exe 40 PID 600 wrote to memory of 2888 600 svchost.exe 40 PID 600 wrote to memory of 2888 600 svchost.exe 40
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:2892
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding2⤵PID:2888
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Sets desktop wallpaper using registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\Factuur4388.PDF.exe"C:\Users\Admin\AppData\Local\Temp\Factuur4388.PDF.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\Factuur4388.PDF.exeC:\Users\Admin\AppData\Local\Temp\Factuur4388.PDF.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {F2365213-1413-4A59-AC79-970B56E69418} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\zgczike.exeC:\Users\Admin\AppData\Local\Temp\zgczike.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\zgczike.exeC:\Users\Admin\AppData\Local\Temp\zgczike.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows all4⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:584
-
-
C:\Users\Admin\AppData\Local\Temp\zgczike.exe"C:\Users\Admin\AppData\Local\Temp\zgczike.exe" -u4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\zgczike.exeC:\Users\Admin\AppData\Local\Temp\zgczike.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1952
-
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1c41⤵
- Suspicious use of AdjustPrivilegeToken
PID:2248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD5c23e63fa43e134577c78eabd463ef0b9
SHA1fb4e9e289add1b6df5f691f93359b47951453634
SHA25698b836ab4a7472f136b8b313afe15bb057fbfc485686562938ebf0a65c6bd562
SHA512b379ab19747f29d5df095a83105e8f642e1eb4de007ac8369b58b71e5de558e29a65281ce94ceaaabbab090a568ce4fe10290942ba5c0d2baf6e569ea65c53ea
-
Filesize
654B
MD5411d7c71f788ac7a0f652f90bccf69b5
SHA122dc952b7deb8457f5758bcb69cb5550a313f8e5
SHA25663eba7145d595a8c02aee28dd0410b665e5c52e4f271626ff6b31574aade125e
SHA512e849ab8021527ff3d722a7ee2b8b26f3d860a765e1251ef672a484a2c544f61d938370f10a6e4645a3ff6f163b5aad8dbfd78fc29c82e521e48e56ff2e952718
-
Filesize
63KB
MD5b4cc030983238da61a066d51022c1101
SHA1fa5d9ec56e179697ba8e3b5eaef0649c55dd29be
SHA25609155aefe60fade57993abf6d524bedd1028e822c0d32f75b5a7f3ae6ff6223b
SHA5124327c939015ceac036c041cb04915a0f3c4b9ef4639d66601bf1f01a1fdf3546279a97fc268f8f4e342929554a4190022aebac8773e007d822b56560f1d8fae0
-
Filesize
772KB
MD595f60b5b36d63307d83e3f3de9675a1d
SHA1da733991d9618b3a3bb5cc503ba0e860f1e8ea29
SHA256f9ae18f90c502fc22c826eb8322a907fa6ddd2b38fdc1b10353d123b8910e674
SHA512de63bb1117043ee0a7fb478c4a2ba3d283d7f3d71f39fdbe357d2aa403f8f4a4e7eafe53595794ef99c35156aedd3854ba2e015b259af573492e90c96e3f34ff
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88